[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256488

 
 

909

 
 

199193

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CESA-2022:7008 -- centos 7 java-11-openjdk

ID: oval:org.secpod.oval:def:205983Date: (C)2022-10-28   (M)2024-06-24
Class: PATCHFamily: unix




Security Fix: OpenJDK: improper MultiByte conversion can lead to buffer overflow OpenJDK: excessive memory allocation in X.509 certificate parsing OpenJDK: HttpServer no connection count limit OpenJDK: improper handling of long NTLM client hostnames OpenJDK: insufficient randomization of JNDI DNS port numbers OpenJDK: missing SNI caching in HTTP/2 For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix:

Platform:
CentOS 7
Product:
java-11-openjdk
Reference:
CESA-2022:7008
CVE-2022-21618
CVE-2022-21626
CVE-2022-21628
CVE-2022-21619
CVE-2022-21624
CVE-2022-39399
CVE    6
CVE-2022-21624
CVE-2022-21626
CVE-2022-21628
CVE-2022-21619
...

© SecPod Technologies