First published: Mon Oct 26 2020(Updated: )
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.<br>Security Fix(es):<br><li> OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781)</li> <li> OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782)</li> <li> OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792)</li> <li> OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797)</li> <li> OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803)</li> <li> OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779)</li> <li> OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.8.0-openjdk-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-debug-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-debug-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-debuginfo-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-debuginfo-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-demo-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-demo-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-demo-debug-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-demo-debug-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-devel-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-devel-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-devel-debug-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-devel-debug-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-headless-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-headless-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-headless-debug-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-headless-debug-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-javadoc-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-javadoc-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-javadoc-debug-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-javadoc-debug-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-src-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-src-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-src-debug-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-src-debug-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-debug-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-debug-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-debuginfo-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-debuginfo-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-demo-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-demo-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-demo-debug-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-demo-debug-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-devel-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-devel-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-devel-debug-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-devel-debug-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-headless-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-headless-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-headless-debug-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-headless-debug-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-src-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-src-1.8.0.272.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-src-debug-1.8.0.272.b10-0.el6_10 | 1.8.0-openjdk-src-debug-1.8.0.272.b10-0.el6_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:4348 is classified as critical due to vulnerabilities that compromise data confidentiality.
To fix RHSA-2020:4348, you should upgrade to the fixed versions of the impacted OpenJDK packages as specified in the advisory.
RHSA-2020:4348 addresses vulnerabilities including unencrypted LDAP connections that could expose credentials.
Affected packages under RHSA-2020:4348 include multiple versions of OpenJDK 8, such as java-1.8.0-openjdk.
No official workaround is available for RHSA-2020:4348; the recommended action is to apply the security updates.