Bug 1889895 (CVE-2020-14803) - CVE-2020-14803 OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)
Summary: CVE-2020-14803 OpenJDK: Race condition in NIO Buffer boundary checks (Librari...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-14803
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: Red Hat1879737 Red Hat1879738 Red Hat1879845 Red Hat1879846 Red Hat1879847 Red Hat1879997 Red Hat1879998 Red Hat1879999 Red Hat1880001 Red Hat1881127 Red Hat1881128 Red Hat1881129 Red Hat1881130 Red Hat1928556 Red Hat1928557 Red Hat1928558 Red Hat1928559
Blocks: Embargoed1876666
TreeView+ depends on / blocked
 
Reported: 2020-10-20 20:46 UTC by Tomas Hoger
Modified: 2021-03-04 17:43 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-10-22 14:21:32 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:4305 0 None None None 2020-10-22 11:07:08 UTC
Red Hat Product Errata RHSA-2020:4306 0 None None None 2020-10-22 10:50:31 UTC
Red Hat Product Errata RHSA-2020:4307 0 None None None 2020-10-22 16:03:36 UTC
Red Hat Product Errata RHSA-2020:4316 0 None None None 2020-10-22 19:40:21 UTC
Red Hat Product Errata RHSA-2020:4347 0 None None None 2020-10-26 20:28:56 UTC
Red Hat Product Errata RHSA-2020:4348 0 None None None 2020-10-27 00:34:31 UTC
Red Hat Product Errata RHSA-2020:4349 0 None None None 2020-10-26 20:00:58 UTC
Red Hat Product Errata RHSA-2020:4350 0 None None None 2020-10-27 00:41:04 UTC
Red Hat Product Errata RHSA-2020:4352 0 None None None 2020-10-26 21:10:37 UTC
Red Hat Product Errata RHSA-2021:0717 0 None None None 2021-03-03 22:54:10 UTC
Red Hat Product Errata RHSA-2021:0733 0 None None None 2021-03-04 15:22:58 UTC
Red Hat Product Errata RHSA-2021:0736 0 None None None 2021-03-04 17:42:59 UTC

Description Tomas Hoger 2020-10-20 20:46:19 UTC
It was discovered that the NIO Buffer implementation in the Libraries component of OpenJDK contained a race condition affecting boundary checks.  An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions.

Comment 1 Tomas Hoger 2020-10-20 20:59:31 UTC
Public now via Oracle CPU October 2020:

https://www.oracle.com/security-alerts/cpuoct2020.html#AppendixJAVA

Fixed in Oracle Java SE 15.0.1 and 11.0.9.

Comment 11 errata-xmlrpc 2020-10-22 10:50:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2020:4306 https://access.redhat.com/errata/RHSA-2020:4306

Comment 12 errata-xmlrpc 2020-10-22 11:07:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4305 https://access.redhat.com/errata/RHSA-2020:4305

Comment 13 Product Security DevOps Team 2020-10-22 14:21:32 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-14803

Comment 14 errata-xmlrpc 2020-10-22 16:03:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:4307 https://access.redhat.com/errata/RHSA-2020:4307

Comment 16 errata-xmlrpc 2020-10-22 19:40:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:4316 https://access.redhat.com/errata/RHSA-2020:4316

Comment 17 Tomas Hoger 2020-10-23 21:12:56 UTC
OpenJDK-11 upstream commit:
http://hg.openjdk.java.net/jdk-updates/jdk11u/rev/4cd63c53fa05

OpenJDK-8 upstream commit:
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/f6804947798c

Comment 24 errata-xmlrpc 2020-10-26 20:00:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:4349 https://access.redhat.com/errata/RHSA-2020:4349

Comment 25 errata-xmlrpc 2020-10-26 20:28:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4347 https://access.redhat.com/errata/RHSA-2020:4347

Comment 26 errata-xmlrpc 2020-10-26 21:10:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2020:4352 https://access.redhat.com/errata/RHSA-2020:4352

Comment 27 errata-xmlrpc 2020-10-27 00:34:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2020:4348 https://access.redhat.com/errata/RHSA-2020:4348

Comment 28 errata-xmlrpc 2020-10-27 00:41:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:4350 https://access.redhat.com/errata/RHSA-2020:4350

Comment 29 Tomas Hoger 2021-01-20 12:51:50 UTC
This is now also fixed in Oracle Java SE 7u291 and 8u281 Oracle CPU January 2021:

https://www.oracle.com/security-alerts/cpujan2021.html#AppendixJAVA

Comment 31 errata-xmlrpc 2021-03-03 22:54:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2021:0717 https://access.redhat.com/errata/RHSA-2021:0717

Comment 32 errata-xmlrpc 2021-03-04 15:22:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2021:0733 https://access.redhat.com/errata/RHSA-2021:0733

Comment 33 errata-xmlrpc 2021-03-04 17:42:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:0736 https://access.redhat.com/errata/RHSA-2021:0736


Note You need to log in before you can comment on or make changes to this bug.