Linux Security
    Linux Security
    Linux Security

    Ubuntu 4433-1: OpenJDK vulnerabilities

    Date
    175
    Posted By
    Several security issues were fixed in OpenJDK.
    ==========================================================================
    Ubuntu Security Notice USN-4433-1
    July 23, 2020
    
    openjdk-lts vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 20.04 LTS
    - Ubuntu 18.04 LTS
    
    Summary:
    
    Several security issues were fixed in OpenJDK.
    
    Software Description:
    - openjdk-lts: Open Source Java implementation
    
    Details:
    
    Johannes Kuhn discovered that OpenJDK incorrectly handled access control
    contexts. An attacker could possibly use this issue to execute arbitrary
    code. (CVE-2020-14556)
    
    It was discovered that OpenJDK incorrectly handled memory allocation when
    reading TIFF image files. An attacker could possibly use this issue to
    cause a denial of service. (CVE-2020-14562)
    
    It was discovered that OpenJDK incorrectly handled input data. An
    attacker could possibly use this issue to insert, edit or obtain
    sensitive information. (CVE-2020-14573)
    
    Philippe Arteau discovered that OpenJDK incorrectly verified names in
    TLS server's X.509 certificates. An attacker could possibly use this
    issue to obtain sensitive information. (CVE-2020-14577)
    
    It was discovered that OpenJDK incorrectly handled image files. An
    attacker could possibly use this issue to obtain sensitive information.
    (CVE-2020-14581)
    
    Markus Loewe discovered that OpenJDK incorrectly handled concurrent
    access in java.nio.Buffer class. An attacker could use this issue to
    bypass the sandbox restrictions and cause unspecified impact.
    (CVE-2020-14583)
    
    It was discovered that OpenJDK incorrectly handled transformation of
    images. An attacker could possibly use this issue to bypass sandbox
    restrictions and insert, edit or obtain sensitive information.
    (CVE-2020-14593)
    
    Roman Shemyakin discovered that OpenJDK incorrectly handled XML files.
    An attacker could possibly use this issue to insert, edit or obtain
    sensitive information. (CVE-2020-14621)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 20.04 LTS:
      openjdk-11-jdk                  11.0.8+10-0ubuntu1~20.04
      openjdk-11-jre                  11.0.8+10-0ubuntu1~20.04
      openjdk-11-jre-headless         11.0.8+10-0ubuntu1~20.04
      openjdk-11-jre-zero             11.0.8+10-0ubuntu1~20.04
    
    Ubuntu 18.04 LTS:
      openjdk-11-jdk                  11.0.8+10-0ubuntu1~18.04.1
      openjdk-11-jre                  11.0.8+10-0ubuntu1~18.04.1
      openjdk-11-jre-headless         11.0.8+10-0ubuntu1~18.04.1
      openjdk-11-jre-zero             11.0.8+10-0ubuntu1~18.04.1
    
    This update uses a new upstream release, which includes additional bug
    fixes. After a standard system update you need to restart any Java
    applications or applets to make all the necessary changes.
    
    References:
      https://usn.ubuntu.com/4433-1
      CVE-2020-14556, CVE-2020-14562, CVE-2020-14573, CVE-2020-14577,
      CVE-2020-14581, CVE-2020-14583, CVE-2020-14593, CVE-2020-14621
    
    Package Information:
      https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.8+10-0ubuntu1~20.04
      https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.8+10-0ubuntu1~18.04.1
    

    Advisories

    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/38-which-aspect-of-server-security-are-you-most-interested-in-learning-more-about?task=poll.vote&format=json
    38
    radio
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.