Bug 1889895 (CVE-2020-14803) - CVE-2020-14803 OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)
Summary: CVE-2020-14803 OpenJDK: Race condition in NIO Buffer boundary checks (Librari...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-14803
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1879737 1879738 1879845 1879846 1879847 1879997 1879998 1879999 1880001 1881127 1881128 1881129 1881130 1928556 1928557 1928558 1928559
Blocks: 1876666
TreeView+ depends on / blocked
 
Reported: 2020-10-20 20:46 UTC by Tomas Hoger
Modified: 2021-03-04 17:43 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-10-22 14:21:32 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:4305 0 None None None 2020-10-22 11:07:08 UTC
Red Hat Product Errata RHSA-2020:4306 0 None None None 2020-10-22 10:50:31 UTC
Red Hat Product Errata RHSA-2020:4307 0 None None None 2020-10-22 16:03:36 UTC
Red Hat Product Errata RHSA-2020:4316 0 None None None 2020-10-22 19:40:21 UTC
Red Hat Product Errata RHSA-2020:4347 0 None None None 2020-10-26 20:28:56 UTC
Red Hat Product Errata RHSA-2020:4348 0 None None None 2020-10-27 00:34:31 UTC
Red Hat Product Errata RHSA-2020:4349 0 None None None 2020-10-26 20:00:58 UTC
Red Hat Product Errata RHSA-2020:4350 0 None None None 2020-10-27 00:41:04 UTC
Red Hat Product Errata RHSA-2020:4352 0 None None None 2020-10-26 21:10:37 UTC
Red Hat Product Errata RHSA-2021:0717 0 None None None 2021-03-03 22:54:10 UTC
Red Hat Product Errata RHSA-2021:0733 0 None None None 2021-03-04 15:22:58 UTC
Red Hat Product Errata RHSA-2021:0736 0 None None None 2021-03-04 17:42:59 UTC

Description Tomas Hoger 2020-10-20 20:46:19 UTC
It was discovered that the NIO Buffer implementation in the Libraries component of OpenJDK contained a race condition affecting boundary checks.  An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions.

Comment 1 Tomas Hoger 2020-10-20 20:59:31 UTC
Public now via Oracle CPU October 2020:

https://www.oracle.com/security-alerts/cpuoct2020.html#AppendixJAVA

Fixed in Oracle Java SE 15.0.1 and 11.0.9.

Comment 11 errata-xmlrpc 2020-10-22 10:50:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2020:4306 https://access.redhat.com/errata/RHSA-2020:4306

Comment 12 errata-xmlrpc 2020-10-22 11:07:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4305 https://access.redhat.com/errata/RHSA-2020:4305

Comment 13 Product Security DevOps Team 2020-10-22 14:21:32 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-14803

Comment 14 errata-xmlrpc 2020-10-22 16:03:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:4307 https://access.redhat.com/errata/RHSA-2020:4307

Comment 16 errata-xmlrpc 2020-10-22 19:40:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:4316 https://access.redhat.com/errata/RHSA-2020:4316

Comment 17 Tomas Hoger 2020-10-23 21:12:56 UTC
OpenJDK-11 upstream commit:
http://hg.openjdk.java.net/jdk-updates/jdk11u/rev/4cd63c53fa05

OpenJDK-8 upstream commit:
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/f6804947798c

Comment 24 errata-xmlrpc 2020-10-26 20:00:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:4349 https://access.redhat.com/errata/RHSA-2020:4349

Comment 25 errata-xmlrpc 2020-10-26 20:28:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4347 https://access.redhat.com/errata/RHSA-2020:4347

Comment 26 errata-xmlrpc 2020-10-26 21:10:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2020:4352 https://access.redhat.com/errata/RHSA-2020:4352

Comment 27 errata-xmlrpc 2020-10-27 00:34:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2020:4348 https://access.redhat.com/errata/RHSA-2020:4348

Comment 28 errata-xmlrpc 2020-10-27 00:41:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:4350 https://access.redhat.com/errata/RHSA-2020:4350

Comment 29 Tomas Hoger 2021-01-20 12:51:50 UTC
This is now also fixed in Oracle Java SE 7u291 and 8u281 Oracle CPU January 2021:

https://www.oracle.com/security-alerts/cpujan2021.html#AppendixJAVA

Comment 31 errata-xmlrpc 2021-03-03 22:54:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2021:0717 https://access.redhat.com/errata/RHSA-2021:0717

Comment 32 errata-xmlrpc 2021-03-04 15:22:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2021:0733 https://access.redhat.com/errata/RHSA-2021:0733

Comment 33 errata-xmlrpc 2021-03-04 17:42:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:0736 https://access.redhat.com/errata/RHSA-2021:0736


Note You need to log in before you can comment on or make changes to this bug.