==========================================================================
Ubuntu Security Notice USN-6272-1
August 03, 2023

openjdk-20 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.04

Summary:

Several security issues were fixed in OpenJDK 20.

Software Description:
- openjdk-20: Open Source Java implementation

Details:

Motoyasu Saburi discovered that OpenJDK 20 incorrectly handled special
characters in file name parameters. An attacker could possibly use
this issue to insert, edit or obtain sensitive information.
(CVE-2023-22006)

Eirik Bjørsnøs discovered that OpenJDK 20 incorrectly handled certain ZIP
archives. An attacker could possibly use this issue to cause a denial
of service. (CVE-2023-22036)

David Stancu discovered that OpenJDK 20 had a flaw in the AES cipher
implementation. An attacker could possibly use this issue to obtain
sensitive information. (CVE-2023-22041)

Zhiqiang Zang discovered that OpenJDK 20 incorrectly handled array accesses
when using the binary '%' operator. An attacker could possibly use this
issue to obtain sensitive information. (CVE-2023-22044)

Zhiqiang Zang discovered that OpenJDK 20 incorrectly handled array accesses.
An attacker could possibly use this issue to obtain sensitive information.
(CVE-2023-22045)

It was discovered that OpenJDK 20 incorrectly sanitized URIs strings. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-22049)

It was discovered that OpenJDK 20 incorrectly handled certain glyphs. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-25193)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.04:
  openjdk-20-jdk                  20.0.2+9+ds1-0ubuntu1~23.04
  openjdk-20-jre                  20.0.2+9+ds1-0ubuntu1~23.04
  openjdk-20-jre-headless         20.0.2+9+ds1-0ubuntu1~23.04
  openjdk-20-jre-zero             20.0.2+9+ds1-0ubuntu1~23.04

This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications or applets to make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6272-1
  CVE-2023-22006, CVE-2023-22036, CVE-2023-22041, CVE-2023-22044,
  CVE-2023-22045, CVE-2023-22049, CVE-2023-25193

Package Information:
  https://launchpad.net/ubuntu/+source/openjdk-20/20.0.2+9+ds1-0ubuntu1~23.04

Ubuntu 6272-1: OpenJDK 20 vulnerabilities

August 3, 2023
Several security issues were fixed in OpenJDK 20.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.04 Summary: Several security issues were fixed in OpenJDK 20. Software Description: - openjdk-20: Open Source Java implementation Details: Motoyasu Saburi discovered that OpenJDK 20 incorrectly handled special characters in file name parameters. An attacker could possibly use this issue to insert, edit or obtain sensitive information. (CVE-2023-22006) Eirik Bjørsnøs discovered that OpenJDK 20 incorrectly handled certain ZIP archives. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-22036) David Stancu discovered that OpenJDK 20 had a flaw in the AES cipher implementation. An attacker could possibly use this issue to obtain sensitive information. (CVE-2023-22041) Zhiqiang Zang discovered that OpenJDK 20 incorrectly handled array accesses when using the binary '%' operator. An attacker could possibly use this issue to obtain sensitive information. (CVE-2023-22044) Zhiqiang Zang discovered that OpenJDK 20 incorrectly handled array accesses. An attacker could possibly use this issue to obtain sensitive information. (CVE-2023-22045) It was discovered that OpenJDK 20 incorrectly sanitized URIs strings. An attacker could possibly use this issue to insert, edit or obtain sensitive information. (CVE-2023-22049) It was discovered that OpenJDK 20 incorrectly handled certain glyphs. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-25193)

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 23.04: openjdk-20-jdk 20.0.2+9+ds1-0ubuntu1~23.04 openjdk-20-jre 20.0.2+9+ds1-0ubuntu1~23.04 openjdk-20-jre-headless 20.0.2+9+ds1-0ubuntu1~23.04 openjdk-20-jre-zero 20.0.2+9+ds1-0ubuntu1~23.04 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications or applets to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-6272-1

CVE-2023-22006, CVE-2023-22036, CVE-2023-22041, CVE-2023-22044,

CVE-2023-22045, CVE-2023-22049, CVE-2023-25193

Severity
Ubuntu Security Notice USN-6272-1

Package Information

https://launchpad.net/ubuntu/+source/openjdk-20/20.0.2+9+ds1-0ubuntu1~23.04

Related News