Linux Security
    Linux Security
    Linux Security

    Ubuntu 4453-1: OpenJDK 8 vulnerabilities

    Date
    221
    Posted By
    Several security issues were fixed in OpenJDK 8.
    ==========================================================================
    Ubuntu Security Notice USN-4453-1
    August 05, 2020
    
    openjdk-8 vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 20.04 LTS
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    
    Summary:
    
    Several security issues were fixed in OpenJDK 8.
    
    Software Description:
    - openjdk-8: Open Source Java implementation
    
    Details:
    
    Johannes Kuhn discovered that OpenJDK 8 incorrectly handled access control
    contexts. An attacker could possibly use this issue to execute arbitrary
    code. (CVE-2020-14556)
    
    Philippe Arteau discovered that OpenJDK 8 incorrectly verified names in
    TLS server's X.509 certificates. An attacker could possibly use this
    issue to obtain sensitive information. (CVE-2020-14577)
    
    It was discovered that OpenJDK 8 incorrectly handled exceptions in
    DerInputStream class and in the DerValue.equals() method. An attacker
    could possibly use this issue to cause a denial of service.
    (CVE-2020-14578, CVE-2020-14579)
    
    It was discovered that OpenJDK 8 incorrectly handled image files. An
    attacker could possibly use this issue to obtain sensitive information.
    (CVE-2020-14581)
    
    Markus Loewe discovered that OpenJDK 8 incorrectly handled concurrent
    access in java.nio.Buffer class. An attacker could use this issue to
    bypass sandbox restrictions.
    (CVE-2020-14583)
    
    It was discovered that OpenJDK 8 incorrectly handled transformation of
    images. An attacker could possibly use this issue to bypass sandbox
    restrictions and insert, edit or obtain sensitive information.
    (CVE-2020-14593)
    
    Roman Shemyakin discovered that OpenJDK 8 incorrectly handled XML files.
    An attacker could possibly use this issue to insert, edit or obtain
    sensitive information. (CVE-2020-14621)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 20.04 LTS:
      openjdk-8-jdk                   8u265-b01-0ubuntu2~20.04
      openjdk-8-jre                   8u265-b01-0ubuntu2~20.04
      openjdk-8-jre-headless          8u265-b01-0ubuntu2~20.04
      openjdk-8-jre-zero              8u265-b01-0ubuntu2~20.04
    
    Ubuntu 18.04 LTS:
      openjdk-8-jdk                   8u265-b01-0ubuntu2~18.04
      openjdk-8-jre                   8u265-b01-0ubuntu2~18.04
      openjdk-8-jre-headless          8u265-b01-0ubuntu2~18.04
      openjdk-8-jre-zero              8u265-b01-0ubuntu2~18.04
    
    Ubuntu 16.04 LTS:
      openjdk-8-jdk                   8u265-b01-0ubuntu2~16.04
      openjdk-8-jre                   8u265-b01-0ubuntu2~16.04
      openjdk-8-jre-headless          8u265-b01-0ubuntu2~16.04
      openjdk-8-jre-jamvm             8u265-b01-0ubuntu2~16.04
      openjdk-8-jre-zero              8u265-b01-0ubuntu2~16.04
    
    This update uses a new upstream release, which includes additional bug
    fixes. After a standard system update you need to restart any Java
    applications or applets to make all the necessary changes.
    
    References:
      https://usn.ubuntu.com/4453-1
      CVE-2020-14556, CVE-2020-14577, CVE-2020-14578, CVE-2020-14579,
      CVE-2020-14581, CVE-2020-14583, CVE-2020-14593, CVE-2020-14621
    
    Package Information:
      https://launchpad.net/ubuntu/+source/openjdk-8/8u265-b01-0ubuntu2~20.04
      https://launchpad.net/ubuntu/+source/openjdk-8/8u265-b01-0ubuntu2~18.04
      https://launchpad.net/ubuntu/+source/openjdk-8/8u265-b01-0ubuntu2~16.04
    

    Advisories

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"2","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.