USN-6077-1: OpenJDK vulnerabilities
=========================================================================
Ubuntu Security Notice USN-6077-1
May 16, 2023
openjdk-8, openjdk-lts, openjdk-17, openjdk-20 vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.04
- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
Summary:
Several security issues were fixed in OpenJDK.
Software Description:
- openjdk-17: Open Source Java implementation
- openjdk-20: Open Source Java implementation
- openjdk-8: Open Source Java implementation
- openjdk-lts: Open Source Java implementation
Details:
Ben Smyth discovered that OpenJDK incorrectly handled half-duplex
connections during TLS handshake. A remote attacker could possibly use
this issue to insert, edit or obtain sensitive information.
(CVE-2023-21930)
It was discovered that OpenJDK incorrectly handled certain inputs. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-21937)
It was discovered that OpenJDK incorrectly handled command arguments. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-21938)
It was discovered that OpenJDK incorrectly validated HTML documents. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-21939)
Ramki Ramakrishna discovered that OpenJDK incorrectly handled garbage
collection. An attacker could possibly use this issue to bypass Java
sandbox restrictions. (CVE-2023-21954)
Jonathan Looney discovered that OpenJDK incorrectly handled certificate
chains during TLS session negotiation. A remote attacker could possibly
use this issue to cause a denial of service. (CVE-2023-21967)
Adam Reziouk discovered that OpenJDK incorrectly sanitized URIs. An
attacker could possibly use this issue to bypass Java sandbox
restrictions. (CVE-2023-21968)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.04:
openjdk-11-jdk 11.0.19+7~us1-0ubuntu1~23.04
openjdk-11-jre 11.0.19+7~us1-0ubuntu1~23.04
openjdk-11-jre-headless 11.0.19+7~us1-0ubuntu1~23.04
openjdk-11-jre-zero 11.0.19+7~us1-0ubuntu1~23.04
openjdk-17-jdk 17.0.7+7~us1-0ubuntu1~23.04
openjdk-17-jre 17.0.7+7~us1-0ubuntu1~23.04
openjdk-17-jre-headless 17.0.7+7~us1-0ubuntu1~23.04
openjdk-17-jre-zero 17.0.7+7~us1-0ubuntu1~23.04
openjdk-20-jdk 20.0.1+9~us1-0ubuntu1~23.04
openjdk-20-jre 20.0.1+9~us1-0ubuntu1~23.04
openjdk-20-jre-headless 20.0.1+9~us1-0ubuntu1~23.04
openjdk-20-jre-zero 20.0.1+9~us1-0ubuntu1~23.04
openjdk-8-jdk 8u372-ga~us1-0ubuntu1~23.04
openjdk-8-jre 8u372-ga~us1-0ubuntu1~23.04
openjdk-8-jre-headless 8u372-ga~us1-0ubuntu1~23.04
openjdk-8-jre-zero 8u372-ga~us1-0ubuntu1~23.04
Ubuntu 22.10:
openjdk-11-jdk 11.0.19+7~us1-0ubuntu1~22.10.1
openjdk-11-jre 11.0.19+7~us1-0ubuntu1~22.10.1
openjdk-11-jre-headless 11.0.19+7~us1-0ubuntu1~22.10.1
openjdk-11-jre-zero 11.0.19+7~us1-0ubuntu1~22.10.1
openjdk-17-jdk 17.0.7+7~us1-0ubuntu1~22.10.2
openjdk-17-jre 17.0.7+7~us1-0ubuntu1~22.10.2
openjdk-17-jre-headless 17.0.7+7~us1-0ubuntu1~22.10.2
openjdk-17-jre-zero 17.0.7+7~us1-0ubuntu1~22.10.2
openjdk-20-jdk 20.0.1+9~us1-0ubuntu1~22.10
openjdk-20-jre 20.0.1+9~us1-0ubuntu1~22.10
openjdk-20-jre-headless 20.0.1+9~us1-0ubuntu1~22.10
openjdk-20-jre-zero 20.0.1+9~us1-0ubuntu1~22.10
openjdk-8-jdk 8u372-ga~us1-0ubuntu1~22.10
openjdk-8-jre 8u372-ga~us1-0ubuntu1~22.10
openjdk-8-jre-headless 8u372-ga~us1-0ubuntu1~22.10
openjdk-8-jre-zero 8u372-ga~us1-0ubuntu1~22.10
Ubuntu 22.04 LTS:
openjdk-11-jdk 11.0.19+7~us1-0ubuntu1~22.04.1
openjdk-11-jre 11.0.19+7~us1-0ubuntu1~22.04.1
openjdk-11-jre-headless 11.0.19+7~us1-0ubuntu1~22.04.1
openjdk-11-jre-zero 11.0.19+7~us1-0ubuntu1~22.04.1
openjdk-17-jdk 17.0.7+7~us1-0ubuntu1~22.04.2
openjdk-17-jre 17.0.7+7~us1-0ubuntu1~22.04.2
openjdk-17-jre-headless 17.0.7+7~us1-0ubuntu1~22.04.2
openjdk-17-jre-zero 17.0.7+7~us1-0ubuntu1~22.04.2
openjdk-8-jdk 8u372-ga~us1-0ubuntu1~22.04
openjdk-8-jre 8u372-ga~us1-0ubuntu1~22.04
openjdk-8-jre-headless 8u372-ga~us1-0ubuntu1~22.04
openjdk-8-jre-zero 8u372-ga~us1-0ubuntu1~22.04
Ubuntu 20.04 LTS:
openjdk-11-jdk 11.0.19+7~us1-0ubuntu1~20.04.1
openjdk-11-jre 11.0.19+7~us1-0ubuntu1~20.04.1
openjdk-11-jre-headless 11.0.19+7~us1-0ubuntu1~20.04.1
openjdk-11-jre-zero 11.0.19+7~us1-0ubuntu1~20.04.1
openjdk-17-jdk 17.0.7+7~us1-0ubuntu1~20.04
openjdk-17-jre 17.0.7+7~us1-0ubuntu1~20.04
openjdk-17-jre-headless 17.0.7+7~us1-0ubuntu1~20.04
openjdk-17-jre-zero 17.0.7+7~us1-0ubuntu1~20.04
openjdk-8-jdk 8u372-ga~us1-0ubuntu1~20.04
openjdk-8-jre 8u372-ga~us1-0ubuntu1~20.04
openjdk-8-jre-headless 8u372-ga~us1-0ubuntu1~20.04
openjdk-8-jre-zero 8u372-ga~us1-0ubuntu1~20.04
Ubuntu 18.04 LTS:
openjdk-11-jdk 11.0.19+7~us1-0ubuntu1~18.04.1
openjdk-11-jre 11.0.19+7~us1-0ubuntu1~18.04.1
openjdk-11-jre-headless 11.0.19+7~us1-0ubuntu1~18.04.1
openjdk-11-jre-zero 11.0.19+7~us1-0ubuntu1~18.04.1
openjdk-17-jdk 17.0.7+7~us1-0ubuntu1~18.04
openjdk-17-jre 17.0.7+7~us1-0ubuntu1~18.04
openjdk-17-jre-headless 17.0.7+7~us1-0ubuntu1~18.04
openjdk-17-jre-zero 17.0.7+7~us1-0ubuntu1~18.04
openjdk-8-jdk 8u372-ga~us1-0ubuntu1~18.04
openjdk-8-jre 8u372-ga~us1-0ubuntu1~18.04
openjdk-8-jre-headless 8u372-ga~us1-0ubuntu1~18.04
openjdk-8-jre-zero 8u372-ga~us1-0ubuntu1~18.04
Ubuntu 16.04 ESM:
openjdk-8-jdk 8u372-ga~us1-0ubuntu1~16.04
openjdk-8-jre 8u372-ga~us1-0ubuntu1~16.04
openjdk-8-jre-headless 8u372-ga~us1-0ubuntu1~16.04
openjdk-8-jre-zero 8u372-ga~us1-0ubuntu1~16.04
This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications or applets to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6077-1
CVE-2023-21930, CVE-2023-21937, CVE-2023-21938, CVE-2023-21939,
CVE-2023-21954, CVE-2023-21967, CVE-2023-21968
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.7+7~us1-0ubuntu1~23.04
https://launchpad.net/ubuntu/+source/openjdk-20/20.0.1+9~us1-0ubuntu1~23.04
https://launchpad.net/ubuntu/+source/openjdk-8/8u372-ga~us1-0ubuntu1~23.04
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.19+7~us1-0ubuntu1~23.04
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.7+7~us1-0ubuntu1~22.10.2
https://launchpad.net/ubuntu/+source/openjdk-20/20.0.1+9~us1-0ubuntu1~22.10
https://launchpad.net/ubuntu/+source/openjdk-8/8u372-ga~us1-0ubuntu1~22.10
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.19+7~us1-0ubuntu1~22.10.1
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.7+7~us1-0ubuntu1~22.04.2
https://launchpad.net/ubuntu/+source/openjdk-8/8u372-ga~us1-0ubuntu1~22.04
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.19+7~us1-0ubuntu1~22.04.1
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.7+7~us1-0ubuntu1~20.04
https://launchpad.net/ubuntu/+source/openjdk-8/8u372-ga~us1-0ubuntu1~20.04
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.19+7~us1-0ubuntu1~20.04.1
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.7+7~us1-0ubuntu1~18.04
https://launchpad.net/ubuntu/+source/openjdk-8/8u372-ga~us1-0ubuntu1~18.04
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.19+7~us1-0ubuntu1~18.04.1
--hh5azumuqmq3pazb
An OpenJDK security update has been released for Ubuntu Linux 16.04 ESM, 18.04 LTS, 20.04 LTS, 22.04 LTS, 22.10, and 23.04.