First published: Wed May 20 2020(Updated: )
IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.<br>This update upgrades IBM Java SE 8 to version 8 SR6-FP10.<br>Security Fix(es):<br><li> OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949)</li> <li> OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803)</li> <li> OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805)</li> <li> OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654)</li> <li> OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781)</li> <li> OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800)</li> <li> OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830)</li> <li> OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754)</li> <li> OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755)</li> <li> OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756)</li> <li> OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.8.0-ibm-1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-1.8.0.6.10-1jpp.1.el6_10 |
redhat/java | <1.8.0-ibm-demo-1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-demo-1.8.0.6.10-1jpp.1.el6_10 |
redhat/java | <1.8.0-ibm-devel-1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-devel-1.8.0.6.10-1jpp.1.el6_10 |
redhat/java | <1.8.0-ibm-jdbc-1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-jdbc-1.8.0.6.10-1jpp.1.el6_10 |
redhat/java | <1.8.0-ibm-plugin-1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-plugin-1.8.0.6.10-1jpp.1.el6_10 |
redhat/java | <1.8.0-ibm-src-1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-src-1.8.0.6.10-1jpp.1.el6_10 |
redhat/java | <1.8.0-ibm-1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-1.8.0.6.10-1jpp.1.el6_10 |
redhat/java | <1.8.0-ibm-demo-1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-demo-1.8.0.6.10-1jpp.1.el6_10 |
redhat/java | <1.8.0-ibm-devel-1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-devel-1.8.0.6.10-1jpp.1.el6_10 |
redhat/java | <1.8.0-ibm-jdbc-1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-jdbc-1.8.0.6.10-1jpp.1.el6_10 |
redhat/java | <1.8.0-ibm-plugin-1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-plugin-1.8.0.6.10-1jpp.1.el6_10 |
redhat/java | <1.8.0-ibm-src-1.8.0.6.10-1jpp.1.el6_10 | 1.8.0-ibm-src-1.8.0.6.10-1jpp.1.el6_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.