Bug 1856896 (CVE-2020-14556) - CVE-2020-14556 OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)
Summary: CVE-2020-14556 OpenJDK: Incorrect handling of access control context in ForkJ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-14556
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1838816 1838817 1838819 1838820 1838823 1838825 1838826 1838827 1838828 1838829 1838830 1838831 1838832 1865914 1865915 1865916 1865917 1866314
Blocks: 1838813
TreeView+ depends on / blocked
 
Reported: 2020-07-14 16:13 UTC by Tomas Hoger
Modified: 2020-12-16 15:20 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-08-06 01:27:52 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2020:2982 0 None None None 2020-07-16 15:08:34 UTC
Red Hat Product Errata RHBA-2020:3000 0 None None None 2020-07-20 12:51:00 UTC
Red Hat Product Errata RHBA-2020:3001 0 None None None 2020-07-20 13:33:07 UTC
Red Hat Product Errata RHBA-2020:3125 0 None None None 2020-07-23 10:32:59 UTC
Red Hat Product Errata RHBA-2020:3126 0 None None None 2020-07-23 10:33:24 UTC
Red Hat Product Errata RHBA-2020:3186 0 None None None 2020-07-28 15:01:14 UTC
Red Hat Product Errata RHBA-2020:3210 0 None None None 2020-07-29 15:40:05 UTC
Red Hat Product Errata RHBA-2020:3213 0 None None None 2020-07-29 15:38:26 UTC
Red Hat Product Errata RHBA-2020:3214 0 None None None 2020-07-29 15:38:57 UTC
Red Hat Product Errata RHBA-2020:3312 0 None None None 2020-08-04 13:28:16 UTC
Red Hat Product Errata RHSA-2020:2968 0 None None None 2020-07-16 10:04:27 UTC
Red Hat Product Errata RHSA-2020:2969 0 None None None 2020-07-16 09:31:41 UTC
Red Hat Product Errata RHSA-2020:2970 0 None None None 2020-07-16 08:51:33 UTC
Red Hat Product Errata RHSA-2020:2972 0 None None None 2020-07-16 09:56:31 UTC
Red Hat Product Errata RHSA-2020:2985 0 None None None 2020-07-16 16:30:48 UTC
Red Hat Product Errata RHSA-2020:3098 0 None None None 2020-07-22 12:39:31 UTC
Red Hat Product Errata RHSA-2020:3099 0 None None None 2020-07-22 12:41:20 UTC
Red Hat Product Errata RHSA-2020:3100 0 None None None 2020-07-22 12:39:55 UTC
Red Hat Product Errata RHSA-2020:3101 0 None None None 2020-07-22 12:41:50 UTC
Red Hat Product Errata RHSA-2020:3386 0 None None None 2020-08-10 15:13:25 UTC
Red Hat Product Errata RHSA-2020:5585 0 None None None 2020-12-16 15:20:37 UTC

Description Tomas Hoger 2020-07-14 16:13:20 UTC
A flaw was found in the way the ForkJoinPool class in the Libraries component of OpenJDK handled its access control context.  This could possibly lead to code being executed with incorrect permissions, possibly leading to bypass of certain intended restrictions defined by a SecurityManager.

Comment 1 Tomas Hoger 2020-07-15 09:17:27 UTC
Public now via Oracle CPU July 2020:

https://www.oracle.com/security-alerts/cpujul2020.html#AppendixJAVA

Fixed in Oracle Java SE 14.0.2, 11.0.8, and 8u261.

Comment 2 Tomas Hoger 2020-07-15 10:43:41 UTC
OpenJDK-11 upstream commit:
http://hg.openjdk.java.net/jdk-updates/jdk11u/rev/0e9eb367df7a

OpenJDK-8 upstream commit:
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/f2610c95d0fe

Comment 3 errata-xmlrpc 2020-07-16 08:51:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:2970 https://access.redhat.com/errata/RHSA-2020:2970

Comment 4 errata-xmlrpc 2020-07-16 09:31:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:2969 https://access.redhat.com/errata/RHSA-2020:2969

Comment 5 errata-xmlrpc 2020-07-16 09:56:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:2972 https://access.redhat.com/errata/RHSA-2020:2972

Comment 6 errata-xmlrpc 2020-07-16 10:04:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:2968 https://access.redhat.com/errata/RHSA-2020:2968

Comment 7 errata-xmlrpc 2020-07-16 16:30:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2020:2985 https://access.redhat.com/errata/RHSA-2020:2985

Comment 8 errata-xmlrpc 2020-07-22 12:39:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:3098 https://access.redhat.com/errata/RHSA-2020:3098

Comment 9 errata-xmlrpc 2020-07-22 12:39:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:3100 https://access.redhat.com/errata/RHSA-2020:3100

Comment 10 errata-xmlrpc 2020-07-22 12:41:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2020:3099 https://access.redhat.com/errata/RHSA-2020:3099

Comment 11 errata-xmlrpc 2020-07-22 12:41:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2020:3101 https://access.redhat.com/errata/RHSA-2020:3101

Comment 12 Product Security DevOps Team 2020-08-06 01:27:52 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-14556

Comment 13 errata-xmlrpc 2020-08-10 15:13:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:3386 https://access.redhat.com/errata/RHSA-2020:3386

Comment 19 errata-xmlrpc 2020-12-16 15:20:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2020:5585 https://access.redhat.com/errata/RHSA-2020:5585


Note You need to log in before you can comment on or make changes to this bug.