[USN-6272-1] OpenJDK 20 vulnerabilities

Eduardo Barretto eduardo.barretto at canonical.com
Thu Aug 3 14:04:00 UTC 2023


==========================================================================
Ubuntu Security Notice USN-6272-1
August 03, 2023

openjdk-20 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.04

Summary:

Several security issues were fixed in OpenJDK 20.

Software Description:
- openjdk-20: Open Source Java implementation

Details:

Motoyasu Saburi discovered that OpenJDK 20 incorrectly handled special
characters in file name parameters. An attacker could possibly use
this issue to insert, edit or obtain sensitive information.
(CVE-2023-22006)

Eirik Bjørsnøs discovered that OpenJDK 20 incorrectly handled certain ZIP
archives. An attacker could possibly use this issue to cause a denial
of service. (CVE-2023-22036)

David Stancu discovered that OpenJDK 20 had a flaw in the AES cipher
implementation. An attacker could possibly use this issue to obtain
sensitive information. (CVE-2023-22041)

Zhiqiang Zang discovered that OpenJDK 20 incorrectly handled array accesses
when using the binary '%' operator. An attacker could possibly use this
issue to obtain sensitive information. (CVE-2023-22044)

Zhiqiang Zang discovered that OpenJDK 20 incorrectly handled array accesses.
An attacker could possibly use this issue to obtain sensitive information.
(CVE-2023-22045)

It was discovered that OpenJDK 20 incorrectly sanitized URIs strings. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-22049)

It was discovered that OpenJDK 20 incorrectly handled certain glyphs. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-25193)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.04:
  openjdk-20-jdk                  20.0.2+9+ds1-0ubuntu1~23.04
  openjdk-20-jre                  20.0.2+9+ds1-0ubuntu1~23.04
  openjdk-20-jre-headless         20.0.2+9+ds1-0ubuntu1~23.04
  openjdk-20-jre-zero             20.0.2+9+ds1-0ubuntu1~23.04

This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications or applets to make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6272-1
  CVE-2023-22006, CVE-2023-22036, CVE-2023-22041, CVE-2023-22044,
  CVE-2023-22045, CVE-2023-22049, CVE-2023-25193

Package Information:
  https://launchpad.net/ubuntu/+source/openjdk-20/20.0.2+9+ds1-0ubuntu1~23.04

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20230803/1ff8b19c/attachment.sig>


More information about the ubuntu-security-announce mailing list