==========================================================================
Ubuntu Security Notice USN-6528-1
November 29, 2023

openjdk-8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in OpenJDK.

Software Description:
- openjdk-8: Open Source Java implementation

Details:

It was discovered that the HotSpot VM implementation in OpenJDK did not
properly validate bytecode blocks in certain situations. An attacker could
possibly use this to cause a denial of service. (CVE-2022-40433)

Carter Kozak discovered that OpenJDK, when compiling with AVX-512
instruction support enabled, could produce code that resulted in memory
corruption in certain situations. An attacker targeting applications built
in this way could possibly use this to cause a denial of service or execute
arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512
instructions. (CVE-2023-22025)

It was discovered that the CORBA implementation in OpenJDK did not properly
perform deserialization of IOR string objects. An attacker could possibly
use this to bypass Java sandbox restrictions. (CVE-2023-22067)

It was discovered that OpenJDK did not properly perform PKIX certification
path validation in certain situations. An attacker could use this to cause
a denial of service. (CVE-2023-22081)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  openjdk-8-jdk                   8u392-ga-1~23.10
  openjdk-8-jdk-headless          8u392-ga-1~23.10
  openjdk-8-jre                   8u392-ga-1~23.10
  openjdk-8-jre-headless          8u392-ga-1~23.10
  openjdk-8-jre-zero              8u392-ga-1~23.10

Ubuntu 23.04:
  openjdk-8-jdk                   8u392-ga-1~23.04
  openjdk-8-jdk-headless          8u392-ga-1~23.04
  openjdk-8-jre                   8u392-ga-1~23.04
  openjdk-8-jre-headless          8u392-ga-1~23.04
  openjdk-8-jre-zero              8u392-ga-1~23.04

Ubuntu 22.04 LTS:
  openjdk-8-jdk                   8u392-ga-1~22.04
  openjdk-8-jdk-headless          8u392-ga-1~22.04
  openjdk-8-jre                   8u392-ga-1~22.04
  openjdk-8-jre-headless          8u392-ga-1~22.04
  openjdk-8-jre-zero              8u392-ga-1~22.04

Ubuntu 20.04 LTS:
  openjdk-8-jdk                   8u392-ga-1~20.04
  openjdk-8-jdk-headless          8u392-ga-1~20.04
  openjdk-8-jre                   8u392-ga-1~20.04
  openjdk-8-jre-headless          8u392-ga-1~20.04
  openjdk-8-jre-zero              8u392-ga-1~20.04

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  openjdk-8-jdk                   8u392-ga-1~18.04
  openjdk-8-jdk-headless          8u392-ga-1~18.04
  openjdk-8-jre                   8u392-ga-1~18.04
  openjdk-8-jre-headless          8u392-ga-1~18.04
  openjdk-8-jre-zero              8u392-ga-1~18.04

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  openjdk-8-jdk                   8u392-ga-1~16.04
  openjdk-8-jdk-headless          8u392-ga-1~16.04
  openjdk-8-jre                   8u392-ga-1~16.04
  openjdk-8-jre-headless          8u392-ga-1~16.04
  openjdk-8-jre-jamvm             8u392-ga-1~16.04
  openjdk-8-jre-zero              8u392-ga-1~16.04

This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications to make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6528-1
  CVE-2022-40433, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081

Package Information:
  https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~23.10
  https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~23.04
  https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~22.04
  https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~20.04

Ubuntu 6528-1: OpenJDK 8 vulnerabilities

November 29, 2023
Several security issues were fixed in OpenJDK.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.10 - Ubuntu 23.04 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in OpenJDK. Software Description: - openjdk-8: Open Source Java implementation Details: It was discovered that the HotSpot VM implementation in OpenJDK did not properly validate bytecode blocks in certain situations. An attacker could possibly use this to cause a denial of service. (CVE-2022-40433) Carter Kozak discovered that OpenJDK, when compiling with AVX-512 instruction support enabled, could produce code that resulted in memory corruption in certain situations. An attacker targeting applications built in this way could possibly use this to cause a denial of service or execute arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512 instructions. (CVE-2023-22025) It was discovered that the CORBA implementation in OpenJDK did not properly perform deserialization of IOR string objects. An attacker could possibly use this to bypass Java sandbox restrictions. (CVE-2023-22067) It was discovered that OpenJDK did not properly perform PKIX certification path validation in certain situations. An attacker could use this to cause a denial of service. (CVE-2023-22081)

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 23.10: openjdk-8-jdk 8u392-ga-1~23.10 openjdk-8-jdk-headless 8u392-ga-1~23.10 openjdk-8-jre 8u392-ga-1~23.10 openjdk-8-jre-headless 8u392-ga-1~23.10 openjdk-8-jre-zero 8u392-ga-1~23.10 Ubuntu 23.04: openjdk-8-jdk 8u392-ga-1~23.04 openjdk-8-jdk-headless 8u392-ga-1~23.04 openjdk-8-jre 8u392-ga-1~23.04 openjdk-8-jre-headless 8u392-ga-1~23.04 openjdk-8-jre-zero 8u392-ga-1~23.04 Ubuntu 22.04 LTS: openjdk-8-jdk 8u392-ga-1~22.04 openjdk-8-jdk-headless 8u392-ga-1~22.04 openjdk-8-jre 8u392-ga-1~22.04 openjdk-8-jre-headless 8u392-ga-1~22.04 openjdk-8-jre-zero 8u392-ga-1~22.04 Ubuntu 20.04 LTS: openjdk-8-jdk 8u392-ga-1~20.04 openjdk-8-jdk-headless 8u392-ga-1~20.04 openjdk-8-jre 8u392-ga-1~20.04 openjdk-8-jre-headless 8u392-ga-1~20.04 openjdk-8-jre-zero 8u392-ga-1~20.04 Ubuntu 18.04 LTS (Available with Ubuntu Pro): openjdk-8-jdk 8u392-ga-1~18.04 openjdk-8-jdk-headless 8u392-ga-1~18.04 openjdk-8-jre 8u392-ga-1~18.04 openjdk-8-jre-headless 8u392-ga-1~18.04 openjdk-8-jre-zero 8u392-ga-1~18.04 Ubuntu 16.04 LTS (Available with Ubuntu Pro): openjdk-8-jdk 8u392-ga-1~16.04 openjdk-8-jdk-headless 8u392-ga-1~16.04 openjdk-8-jre 8u392-ga-1~16.04 openjdk-8-jre-headless 8u392-ga-1~16.04 openjdk-8-jre-jamvm 8u392-ga-1~16.04 openjdk-8-jre-zero 8u392-ga-1~16.04 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-6528-1

CVE-2022-40433, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081

Severity
Ubuntu Security Notice USN-6528-1

Package Information

https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~23.10 https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~23.04 https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~22.04 https://launchpad.net/ubuntu/+source/openjdk-8/8u392-ga-1~20.04

Related News