USN-4607-1 fixed vulnerabilities and added features in OpenJDK. Unfortunately, that update introduced a regression that could cause TLS connections with client certificate authentication to fail in some situations. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that OpenJDK incorrectly handled deserializing Proxy class objects with many interfaces. A remote attacker could possibly use this issue to cause a denial of service (memory consumption) via a specially crafted input. (CVE-2020-14779)
Sergey Ostanin discovered that OpenJDK incorrectly restricted authentication mechanisms. A remote attacker could possibly use this issue to obtain sensitive information over an unencrypted connection. (CVE-2020-14781)
It was discovered that OpenJDK incorrectly handled untrusted certificates. An attacker could possibly use this issue to read or write sensitive information. (CVE-2020-14782)
Zhiqiang Zang discovered that OpenJDK incorrectly checked for integer overflows. An attacker could possibly use this issue to bypass certain Java sandbox restrictions. (CVE-2020-14792)
Markus Loewe discovered that OpenJDK incorrectly checked permissions when converting a file system path to an URI. An attacker could possibly use this issue to bypass certain Java sandbox restrictions. (CVE-2020-14796)
Markus Loewe discovered that OpenJDK incorrectly checked for invalid characters when converting an URI to a path. An attacker could possibly use this issue to read or write sensitive information. (CVE-2020-14797)
Markus Loewe discovered that OpenJDK incorrectly checked the length of input strings. An attacker could possibly use this issue to bypass certain Java sandbox restrictions. (CVE-2020-14798)
It was discovered that OpenJDK incorrectly handled boundary checks. An attacker could possibly use this issue to bypass certain Java sandbox restrictions. (CVE-2020-14803)
{
"binaries": [
{
"binary_name": "openjdk-8-demo",
"binary_version": "8u275-b01-0ubuntu1~16.04"
},
{
"binary_name": "openjdk-8-jdk",
"binary_version": "8u275-b01-0ubuntu1~16.04"
},
{
"binary_name": "openjdk-8-jdk-headless",
"binary_version": "8u275-b01-0ubuntu1~16.04"
},
{
"binary_name": "openjdk-8-jre",
"binary_version": "8u275-b01-0ubuntu1~16.04"
},
{
"binary_name": "openjdk-8-jre-headless",
"binary_version": "8u275-b01-0ubuntu1~16.04"
},
{
"binary_name": "openjdk-8-jre-jamvm",
"binary_version": "8u275-b01-0ubuntu1~16.04"
},
{
"binary_name": "openjdk-8-jre-zero",
"binary_version": "8u275-b01-0ubuntu1~16.04"
},
{
"binary_name": "openjdk-8-source",
"binary_version": "8u275-b01-0ubuntu1~16.04"
}
],
"availability": "No subscription required"
}
{
"ecosystem": "Ubuntu:16.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14779"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14781"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14782"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14792"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14796"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14797"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14798"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14803"
}
]
}
{
"binaries": [
{
"binary_name": "openjdk-8-demo",
"binary_version": "8u275-b01-0ubuntu1~18.04"
},
{
"binary_name": "openjdk-8-jdk",
"binary_version": "8u275-b01-0ubuntu1~18.04"
},
{
"binary_name": "openjdk-8-jdk-headless",
"binary_version": "8u275-b01-0ubuntu1~18.04"
},
{
"binary_name": "openjdk-8-jre",
"binary_version": "8u275-b01-0ubuntu1~18.04"
},
{
"binary_name": "openjdk-8-jre-headless",
"binary_version": "8u275-b01-0ubuntu1~18.04"
},
{
"binary_name": "openjdk-8-jre-zero",
"binary_version": "8u275-b01-0ubuntu1~18.04"
},
{
"binary_name": "openjdk-8-source",
"binary_version": "8u275-b01-0ubuntu1~18.04"
}
],
"availability": "No subscription required"
}
{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14779"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14781"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14782"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14792"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14796"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14797"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14798"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14803"
}
]
}
{
"binaries": [
{
"binary_name": "openjdk-11-demo",
"binary_version": "11.0.9.1+1-0ubuntu1~18.04"
},
{
"binary_name": "openjdk-11-jdk",
"binary_version": "11.0.9.1+1-0ubuntu1~18.04"
},
{
"binary_name": "openjdk-11-jdk-headless",
"binary_version": "11.0.9.1+1-0ubuntu1~18.04"
},
{
"binary_name": "openjdk-11-jre",
"binary_version": "11.0.9.1+1-0ubuntu1~18.04"
},
{
"binary_name": "openjdk-11-jre-headless",
"binary_version": "11.0.9.1+1-0ubuntu1~18.04"
},
{
"binary_name": "openjdk-11-jre-zero",
"binary_version": "11.0.9.1+1-0ubuntu1~18.04"
},
{
"binary_name": "openjdk-11-source",
"binary_version": "11.0.9.1+1-0ubuntu1~18.04"
}
],
"availability": "No subscription required"
}
{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14779"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14781"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14782"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14792"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14796"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14797"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14798"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14803"
}
]
}
{
"binaries": [
{
"binary_name": "openjdk-8-demo",
"binary_version": "8u275-b01-0ubuntu1~20.04"
},
{
"binary_name": "openjdk-8-jdk",
"binary_version": "8u275-b01-0ubuntu1~20.04"
},
{
"binary_name": "openjdk-8-jdk-headless",
"binary_version": "8u275-b01-0ubuntu1~20.04"
},
{
"binary_name": "openjdk-8-jre",
"binary_version": "8u275-b01-0ubuntu1~20.04"
},
{
"binary_name": "openjdk-8-jre-headless",
"binary_version": "8u275-b01-0ubuntu1~20.04"
},
{
"binary_name": "openjdk-8-jre-zero",
"binary_version": "8u275-b01-0ubuntu1~20.04"
},
{
"binary_name": "openjdk-8-source",
"binary_version": "8u275-b01-0ubuntu1~20.04"
}
],
"availability": "No subscription required"
}
{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14779"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14781"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14782"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14792"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14796"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14797"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14798"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14803"
}
]
}
{
"binaries": [
{
"binary_name": "openjdk-11-demo",
"binary_version": "11.0.9.1+1-0ubuntu1~20.04"
},
{
"binary_name": "openjdk-11-jdk",
"binary_version": "11.0.9.1+1-0ubuntu1~20.04"
},
{
"binary_name": "openjdk-11-jdk-headless",
"binary_version": "11.0.9.1+1-0ubuntu1~20.04"
},
{
"binary_name": "openjdk-11-jre",
"binary_version": "11.0.9.1+1-0ubuntu1~20.04"
},
{
"binary_name": "openjdk-11-jre-headless",
"binary_version": "11.0.9.1+1-0ubuntu1~20.04"
},
{
"binary_name": "openjdk-11-jre-zero",
"binary_version": "11.0.9.1+1-0ubuntu1~20.04"
},
{
"binary_name": "openjdk-11-source",
"binary_version": "11.0.9.1+1-0ubuntu1~20.04"
}
],
"availability": "No subscription required"
}
{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14779"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14781"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14782"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14792"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14796"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14797"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14798"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-14803"
}
]
}