{"id":"MGASA-2019-0302","summary":"Updated java-1.8.0-openjdk packages fix security vulnerabilities","details":"The updated packages fix several bugs and some security issues:\n\nMissing restrictions on use of custom SocketImpl (Networking, 8218573).\n(CVE-2019-2945)\n\nImproper handling of Kerberos proxy credentials (Kerberos, 8220302).\n(CVE-2019-2949)\n\nNULL pointer dereference in DrawGlyphList (2D, 8222690). (CVE-2019-2962)\n\nUnexpected exception thrown by Pattern processing crafted regular\nexpression (Concurrency, 8222684). (CVE-2019-2964)\n\nUnexpected exception thrown by XPathParser processing crafted XPath\nexpression (JAXP, 8223505). (CVE-2019-2973)\n\nUnexpected exception thrown during regular expression processing in\nNashorn (Scripting, 8223518). (CVE-2019-2975)\n\nIncorrect handling of nested jar: URLs in Jar URL handler\n(Networking, 8223892). (CVE-2019-2978)\n\nUnexpected exception thrown by XPath processing crafted XPath expression\n(JAXP, 8224532). (CVE-2019-2981)\n\nUnexpected exception thrown during Font object deserialization\n(Serialization, 8224915). (CVE-2019-2983)\n\nMissing glyph bitmap image dimension check in FreetypeFontScaler\n(2D, 8225286). (CVE-2019-2987)\n\nInteger overflow in bounds check in SunGraphics2D (2D, 8225292).\n(CVE-2019-2988)\n\nIncorrect handling of HTTP proxy responses in HttpURLConnection\n(Networking, 8225298). (CVE-2019-2989)\n\nExcessive memory allocation in CMap when reading TrueType font\n(2D, 8225597). (CVE-2019-2992)\n\nInsufficient filtering of HTML event attributes in Javadoc\n(Javadoc, 8226765). (CVE-2019-2999)\n","modified":"2026-04-16T01:47:54.537085248Z","published":"2019-10-23T21:06:40Z","upstream":["CVE-2019-2945","CVE-2019-2949","CVE-2019-2962","CVE-2019-2964","CVE-2019-2973","CVE-2019-2975","CVE-2019-2978","CVE-2019-2981","CVE-2019-2983","CVE-2019-2987","CVE-2019-2988","CVE-2019-2989","CVE-2019-2992","CVE-2019-2999"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2019-0302.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=25576"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html#AppendixJAVA"}],"affected":[{"package":{"name":"java-1.8.0-openjdk","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/java-1.8.0-openjdk?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.0.232-1.b09.2.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2019-0302.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}