From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 23B06158094 for ; Sun, 25 Sep 2022 13:49:57 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id C22FAE0DF0; Sun, 25 Sep 2022 13:43:34 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id B8214E0636 for ; Sun, 25 Sep 2022 13:36:16 +0000 (UTC) Received: from glsamakerdev.dev.gentoo.org (unknown [140.211.166.165]) by smtp.gentoo.org (Postfix) with ESMTP id 09C4733D3C2 for ; Sun, 25 Sep 2022 13:36:16 +0000 (UTC) Received: from [172.18.0.3] (unknown [172.18.0.3]) by glsamakerdev.dev.gentoo.org (Postfix) with ESMTP id D528C8CA74 for ; Sun, 25 Sep 2022 13:36:15 +0000 (-00) Subject: [gentoo-announce] [ GLSA 202209-15 ] Oracle JDK/JRE: Multiple vulnerabilities Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg="pgp-sha512"; boundary="===============0882767678727131082==" From: glsamaker@gentoo.org To: gentoo-announce@lists.gentoo.org Reply-To: security@gentoo.org Date: Sun, 25 Sep 2022 13:36:15 -0000 Message-ID: <166411297586.9.10268413624691973165@90bb6a0775af> X-Archives-Salt: 547f2f0d-2b52-4ea2-8ebf-42b49d3a389e X-Archives-Hash: 6013d0b2e4e531c1f512dd16cc66df7c --===============0882767678727131082== Content-Type: text/plain; charset="utf-8" - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202209-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Oracle JDK/JRE: Multiple vulnerabilities Date: September 25, 2022 Bugs: #732630, #717638 ID: 202209-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Oracle JDK and JRE, the worst of which could result in the arbitrary execution of code. Background ========== Java Platform, Standard Edition (Java SE) lets you develop and deploy Java applications on desktops and servers, as well as in today's demanding embedded environments. Java offers the rich user interface, performance, versatility, portability, and security that today's applications require. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-java/oracle-jdk-bin <= 11.0.2 Vulnerable! 2 dev-java/oracle-jre-bin <= 1.8.0.202 Vulnerable! Description =========== Multiple vulnerabilities have been discovered in Oracle's JDK and JRE software suites. Please review the CVE identifiers referenced below for details. Impact ====== Certain uses of untrusted data by Oracle JDK and JRE could result in arbitrary code execution. Workaround ========== There is no known workaround at this time. Resolution ========== Gentoo has discontinued support for the Oracle JDK and JRE. We recommend that users remove it, and use dev-java/openjdk, dev-java/openjdk-bin, or dev-java/openjdk-jre-bin instead: # emerge --ask --depclean "dev-java/oracle-jre-bin" # emerge --ask --depclean "dev-java/oracle-jdk-bin" References ========== [ 1 ] CVE-2020-2585 https://nvd.nist.gov/vuln/detail/CVE-2020-2585 [ 2 ] CVE-2020-2755 https://nvd.nist.gov/vuln/detail/CVE-2020-2755 [ 3 ] CVE-2020-2756 https://nvd.nist.gov/vuln/detail/CVE-2020-2756 [ 4 ] CVE-2020-2757 https://nvd.nist.gov/vuln/detail/CVE-2020-2757 [ 5 ] CVE-2020-2773 https://nvd.nist.gov/vuln/detail/CVE-2020-2773 [ 6 ] CVE-2020-2781 https://nvd.nist.gov/vuln/detail/CVE-2020-2781 [ 7 ] CVE-2020-2800 https://nvd.nist.gov/vuln/detail/CVE-2020-2800 [ 8 ] CVE-2020-2803 https://nvd.nist.gov/vuln/detail/CVE-2020-2803 [ 9 ] CVE-2020-2805 https://nvd.nist.gov/vuln/detail/CVE-2020-2805 [ 10 ] CVE-2020-14556 https://nvd.nist.gov/vuln/detail/CVE-2020-14556 [ 11 ] CVE-2020-14562 https://nvd.nist.gov/vuln/detail/CVE-2020-14562 [ 12 ] CVE-2020-14573 https://nvd.nist.gov/vuln/detail/CVE-2020-14573 [ 13 ] CVE-2020-14577 https://nvd.nist.gov/vuln/detail/CVE-2020-14577 [ 14 ] CVE-2020-14578 https://nvd.nist.gov/vuln/detail/CVE-2020-14578 [ 15 ] CVE-2020-14579 https://nvd.nist.gov/vuln/detail/CVE-2020-14579 [ 16 ] CVE-2020-14581 https://nvd.nist.gov/vuln/detail/CVE-2020-14581 [ 17 ] CVE-2020-14583 https://nvd.nist.gov/vuln/detail/CVE-2020-14583 [ 18 ] CVE-2020-14593 https://nvd.nist.gov/vuln/detail/CVE-2020-14593 [ 19 ] CVE-2020-14621 https://nvd.nist.gov/vuln/detail/CVE-2020-14621 [ 20 ] CVE-2020-14664 https://nvd.nist.gov/vuln/detail/CVE-2020-14664 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202209-15 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --===============0882767678727131082== Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmMwWU8ACgkQFMQkOaVy +9nINhAA2xr2mf+x7gqpLRwx5U18MllXeAfjlvvmjAJvoaBemFexJEwC2oIrP4R+ qhMLEuxgdc68nREHkzekETZQdbwyFSWsopgyh+nWMahHjiD1qYIJ2vJydfeIQT6Z GQKOvlc40qqiEJ53h2vB6i1hc8UGrCoterwcAFxZ3BOpshNOdWQfEOTV7t+enUS4 P5RwkZ+9XMYjgaIrAoDmkLVpm+p919oyG0pNT8JbvPcFbuAPC1qw1ToJFhyZdGaF Wc/XaFGAy3YdFl1i00MgBskyBa6lI6nX94yPWYWpX7RFN5Hmf66Rpoo0QS5volr6 3FyxDuXNZKAa5LbQXQN/lVDw7iEc18Zhfebq1MnzUQq7aw6ViI2iMwBwjfgJUw4o WQobJPIgqNhpJ7Q3/CA7fKe8DPNc9wqKqaJF9Cr8ySOaIvmbNqMJPQiQo+6inKZo KCgvkCRt8i5M2royHPlqWLVFjNzYP+PfgyCqj0HSjLN36HgRDWaoVSXvSCAhTWLm SixJKiGdTD7u6GWeuK7nc9e8XqWhmqQ0+myP66PVuzTSNhcDMQ/dnhUBP4GK6NLG wB5CaS6l3D5bMM/rT7p6L3pnGGjbvFntOVoc8huYN00D7KbyNI6TLvOGCOLefsfR 3aTVv3RKFapIEuH6pYK943oCW2PXATFIuVQ9lVX+iEgTmxCphgY= =+Elm -----END PGP SIGNATURE----- --===============0882767678727131082==--