Ubuntu Security Notice 4433-1 - Johannes Kuhn discovered that OpenJDK incorrectly handled access control contexts. An attacker could possibly use this issue to execute arbitrary code. It was discovered that OpenJDK incorrectly handled memory allocation when reading TIFF image files. An attacker could possibly use this issue to cause a denial of service. It was discovered that OpenJDK incorrectly handled input data. An attacker could possibly use this issue to insert, edit or obtain sensitive information. Various other issues were also addressed.
8e8cb87ca79806cf6127f395fb824cde823abf6a54241c7e85eaa05eb4ab39df
=========================================================================
Ubuntu Security Notice USN-4433-1
July 23, 2020
openjdk-lts vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in OpenJDK.
Software Description:
- openjdk-lts: Open Source Java implementation
Details:
Johannes Kuhn discovered that OpenJDK incorrectly handled access control
contexts. An attacker could possibly use this issue to execute arbitrary
code. (CVE-2020-14556)
It was discovered that OpenJDK incorrectly handled memory allocation when
reading TIFF image files. An attacker could possibly use this issue to
cause a denial of service. (CVE-2020-14562)
It was discovered that OpenJDK incorrectly handled input data. An
attacker could possibly use this issue to insert, edit or obtain
sensitive information. (CVE-2020-14573)
Philippe Arteau discovered that OpenJDK incorrectly verified names in
TLS server's X.509 certificates. An attacker could possibly use this
issue to obtain sensitive information. (CVE-2020-14577)
It was discovered that OpenJDK incorrectly handled image files. An
attacker could possibly use this issue to obtain sensitive information.
(CVE-2020-14581)
Markus Loewe discovered that OpenJDK incorrectly handled concurrent
access in java.nio.Buffer class. An attacker could use this issue to
bypass the sandbox restrictions and cause unspecified impact.
(CVE-2020-14583)
It was discovered that OpenJDK incorrectly handled transformation of
images. An attacker could possibly use this issue to bypass sandbox
restrictions and insert, edit or obtain sensitive information.
(CVE-2020-14593)
Roman Shemyakin discovered that OpenJDK incorrectly handled XML files.
An attacker could possibly use this issue to insert, edit or obtain
sensitive information. (CVE-2020-14621)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
openjdk-11-jdk 11.0.8+10-0ubuntu1~20.04
openjdk-11-jre 11.0.8+10-0ubuntu1~20.04
openjdk-11-jre-headless 11.0.8+10-0ubuntu1~20.04
openjdk-11-jre-zero 11.0.8+10-0ubuntu1~20.04
Ubuntu 18.04 LTS:
openjdk-11-jdk 11.0.8+10-0ubuntu1~18.04.1
openjdk-11-jre 11.0.8+10-0ubuntu1~18.04.1
openjdk-11-jre-headless 11.0.8+10-0ubuntu1~18.04.1
openjdk-11-jre-zero 11.0.8+10-0ubuntu1~18.04.1
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.
References:
https://usn.ubuntu.com/4433-1
CVE-2020-14556, CVE-2020-14562, CVE-2020-14573, CVE-2020-14577,
CVE-2020-14581, CVE-2020-14583, CVE-2020-14593, CVE-2020-14621
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.8+10-0ubuntu1~20.04
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.8+10-0ubuntu1~18.04.1