USN-4433-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4433-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-4433-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4433-1
Related
  • CVE-2020-14556
  • CVE-2020-14562
  • CVE-2020-14573
  • CVE-2020-14577
  • CVE-2020-14581
  • CVE-2020-14583
  • CVE-2020-14593
  • CVE-2020-14621
Published
2020-07-23T18:07:48.362336Z
Modified
2020-07-23T18:07:48.362336Z
Summary
openjdk-lts vulnerabilities
Details

Johannes Kuhn discovered that OpenJDK incorrectly handled access control contexts. An attacker could possibly use this issue to execute arbitrary code. (CVE-2020-14556)

It was discovered that OpenJDK incorrectly handled memory allocation when reading TIFF image files. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-14562)

It was discovered that OpenJDK incorrectly handled input data. An attacker could possibly use this issue to insert, edit or obtain sensitive information. (CVE-2020-14573)

Philippe Arteau discovered that OpenJDK incorrectly verified names in TLS server's X.509 certificates. An attacker could possibly use this issue to obtain sensitive information. (CVE-2020-14577)

It was discovered that OpenJDK incorrectly handled image files. An attacker could possibly use this issue to obtain sensitive information. (CVE-2020-14581)

Markus Loewe discovered that OpenJDK incorrectly handled concurrent access in java.nio.Buffer class. An attacker could use this issue to bypass the sandbox restrictions and cause unspecified impact. (CVE-2020-14583)

It was discovered that OpenJDK incorrectly handled transformation of images. An attacker could possibly use this issue to bypass sandbox restrictions and insert, edit or obtain sensitive information. (CVE-2020-14593)

Roman Shemyakin discovered that OpenJDK incorrectly handled XML files. An attacker could possibly use this issue to insert, edit or obtain sensitive information. (CVE-2020-14621)

References

Affected packages

Ubuntu:20.04:LTS / openjdk-lts

Package

Name
openjdk-lts

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
11.0.8+10-0ubuntu1~20.04

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "openjdk-11-jre-zero": "11.0.8+10-0ubuntu1~20.04",
            "openjdk-11-demo": "11.0.8+10-0ubuntu1~20.04",
            "openjdk-11-source": "11.0.8+10-0ubuntu1~20.04",
            "openjdk-11-jdk": "11.0.8+10-0ubuntu1~20.04",
            "openjdk-11-doc": "11.0.8+10-0ubuntu1~20.04",
            "openjdk-11-jdk-headless": "11.0.8+10-0ubuntu1~20.04",
            "openjdk-11-jre": "11.0.8+10-0ubuntu1~20.04",
            "openjdk-11-jre-headless": "11.0.8+10-0ubuntu1~20.04"
        }
    ]
}

Ubuntu:18.04:LTS / openjdk-lts

Package

Name
openjdk-lts

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
11.0.8+10-0ubuntu1~18.04.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "openjdk-11-jre-zero": "11.0.8+10-0ubuntu1~18.04.1",
            "openjdk-11-demo": "11.0.8+10-0ubuntu1~18.04.1",
            "openjdk-11-source": "11.0.8+10-0ubuntu1~18.04.1",
            "openjdk-11-jdk": "11.0.8+10-0ubuntu1~18.04.1",
            "openjdk-11-doc": "11.0.8+10-0ubuntu1~18.04.1",
            "openjdk-11-jdk-headless": "11.0.8+10-0ubuntu1~18.04.1",
            "openjdk-11-jre": "11.0.8+10-0ubuntu1~18.04.1",
            "openjdk-11-jre-headless": "11.0.8+10-0ubuntu1~18.04.1"
        }
    ]
}