{"id":"MGASA-2020-0309","summary":"Updated java-1.8.0-openjdk packages fix security vulnerability","details":"Bypass of boundary checks in nio.Buffer via concurrent access.\n(CVE-2020-14583)\n\nIncomplete bounds checks in Affine Transformations. (CVE-2020-14593)\n\nIncorrect handling of access control context in ForkJoinPool.\n(CVE-2020-14556)\n\nUnexpected exception raised by DerInputStream. (CVE-2020-14578)\n\nUnexpected exception raised by DerValue.equals(). (CVE-2020-14579)\n\nXML validation manipulation due to incomplete application of the\nuse-grammar-pool-only feature. (CVE-2020-14621)\n\nHostnameChecker does not ensure X.509 certificate names are in\nnormalized form. (CVE-2020-14577)\n","modified":"2026-04-16T04:44:37.814505591Z","published":"2020-07-31T23:25:42Z","upstream":["CVE-2020-14556","CVE-2020-14577","CVE-2020-14578","CVE-2020-14579","CVE-2020-14583","CVE-2020-14593","CVE-2020-14621"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0309.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=26960"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2020:2972"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}],"affected":[{"package":{"name":"java-1.8.0-openjdk","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/java-1.8.0-openjdk?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.0.262-1.b10.1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0309.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}