First published: Tue Jul 14 2020(Updated: )
A flaw was found in the way the ForkJoinPool class in the Libraries component of OpenJDK handled its access control context. This could possibly lead to code being executed with incorrect permissions, possibly leading to bypass of certain intended restrictions defined by a SecurityManager.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.8.0-openjdk-1:1.8.0.262.b10-0.el6_10 | 1.8.0-openjdk-1:1.8.0.262.b10-0.el6_10 |
redhat/java | <1.8.0-openjdk-1:1.8.0.262.b10-0.el7_8 | 1.8.0-openjdk-1:1.8.0.262.b10-0.el7_8 |
redhat/java | <11-openjdk-1:11.0.8.10-0.el7_8 | 11-openjdk-1:11.0.8.10-0.el7_8 |
redhat/java | <1.8.0-ibm-1:1.8.0.6.20-1jpp.1.el7 | 1.8.0-ibm-1:1.8.0.6.20-1jpp.1.el7 |
redhat/java | <11-openjdk-1:11.0.8.10-0.el8_2 | 11-openjdk-1:11.0.8.10-0.el8_2 |
redhat/java | <1.8.0-openjdk-1:1.8.0.262.b10-0.el8_2 | 1.8.0-openjdk-1:1.8.0.262.b10-0.el8_2 |
redhat/java | <1.8.0-ibm-1:1.8.0.6.15-1.el8_2 | 1.8.0-ibm-1:1.8.0.6.15-1.el8_2 |
redhat/java | <11-openjdk-1:11.0.8.10-0.el8_0 | 11-openjdk-1:11.0.8.10-0.el8_0 |
redhat/java | <1.8.0-openjdk-1:1.8.0.262.b10-0.el8_0 | 1.8.0-openjdk-1:1.8.0.262.b10-0.el8_0 |
redhat/java | <11-openjdk-1:11.0.8.10-0.el8_1 | 11-openjdk-1:11.0.8.10-0.el8_1 |
redhat/java | <1.8.0-openjdk-1:1.8.0.262.b10-0.el8_1 | 1.8.0-openjdk-1:1.8.0.262.b10-0.el8_1 |
Oracle JDK 6 | =1.8.0-update251 | |
Oracle JDK 6 | =11.0.7 | |
Oracle JDK 6 | =14.0.1 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update251 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE | =15.1 | |
openSUSE | =15.2 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
NetApp 7-Mode Transition Tool | ||
netapp active iq unified manager windows | >=7.3 | |
netapp active iq unified manager vsphere | >=9.5 | |
netapp cloud backup | ||
netapp cloud secure agent | ||
netapp e-series performance analyzer | ||
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.70.2 | |
netapp e-series santricity Web services Web services proxy | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
netapp santricity unified manager | ||
netapp snapmanager sap | ||
netapp snapmanager Oracle | ||
NetApp SteelStore | ||
netapp storagegrid | >=9.0.0<=9.0.4 | |
netapp storagegrid | ||
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.26+4-1~deb11u1 11.0.26+4-1 | |
debian/openjdk-8 | 8u442-ga-2 | |
Fedora | =31 | |
Fedora | =32 | |
Debian | =9.0 | |
Debian | =10.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-14556 has been assigned a medium severity rating due to its potential to allow code execution with incorrect permissions.
To fix CVE-2020-14556, upgrade to the recommended versions of OpenJDK listed for your platform.
CVE-2020-14556 may lead to a bypass of intended restrictions defined by a SecurityManager, potentially compromising application security.
CVE-2020-14556 affects specific versions of OpenJDK, including versions up to 1.8.0-openjdk-1:1.8.0.262.b10-0 and 11-openjdk-1:11.0.8.10-0.
Yes, CVE-2020-14556 is relevant to various operating systems that use vulnerable versions of OpenJDK, including multiple editions of Red Hat, Debian, and Ubuntu.