Lucene search

K
ubuntuUbuntuUSN-6272-1
HistoryAug 03, 2023 - 12:00 a.m.

OpenJDK 20 vulnerabilities

2023-08-0300:00:00
ubuntu.com
30

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6 Medium

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

53.1%

Releases

  • Ubuntu 23.04

Packages

  • openjdk-20 - Open Source Java implementation

Details

Motoyasu Saburi discovered that OpenJDK 20 incorrectly handled special
characters in file name parameters. An attacker could possibly use
this issue to insert, edit or obtain sensitive information.
(CVE-2023-22006)

Eirik Bjørsnøs discovered that OpenJDK 20 incorrectly handled certain ZIP
archives. An attacker could possibly use this issue to cause a denial
of service. (CVE-2023-22036)

David Stancu discovered that OpenJDK 20 had a flaw in the AES cipher
implementation. An attacker could possibly use this issue to obtain
sensitive information. (CVE-2023-22041)

Zhiqiang Zang discovered that OpenJDK 20 incorrectly handled array accesses
when using the binary ‘%’ operator. An attacker could possibly use this
issue to obtain sensitive information. (CVE-2023-22044)

Zhiqiang Zang discovered that OpenJDK 20 incorrectly handled array accesses.
An attacker could possibly use this issue to obtain sensitive information.
(CVE-2023-22045)

It was discovered that OpenJDK 20 incorrectly sanitized URIs strings. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-22049)

It was discovered that OpenJDK 20 incorrectly handled certain glyphs. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-25193)

OSVersionArchitecturePackageVersionFilename
Ubuntu23.04noarchopenjdk-20-jre< 20.0.2+9+ds1-0ubuntu1~23.04UNKNOWN
Ubuntu23.04noarchopenjdk-20-dbg< 20.0.2+9+ds1-0ubuntu1~23.04UNKNOWN
Ubuntu23.04noarchopenjdk-20-demo< 20.0.2+9+ds1-0ubuntu1~23.04UNKNOWN
Ubuntu23.04noarchopenjdk-20-doc< 20.0.2+9+ds1-0ubuntu1~23.04UNKNOWN
Ubuntu23.04noarchopenjdk-20-jdk< 20.0.2+9+ds1-0ubuntu1~23.04UNKNOWN
Ubuntu23.04noarchopenjdk-20-jdk-headless< 20.0.2+9+ds1-0ubuntu1~23.04UNKNOWN
Ubuntu23.04noarchopenjdk-20-jre-headless< 20.0.2+9+ds1-0ubuntu1~23.04UNKNOWN
Ubuntu23.04noarchopenjdk-20-jre-zero< 20.0.2+9+ds1-0ubuntu1~23.04UNKNOWN
Ubuntu23.04noarchopenjdk-20-source< 20.0.2+9+ds1-0ubuntu1~23.04UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6 Medium

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

53.1%