Lucene search

K
ubuntuUbuntuUSN-5898-1
HistoryFeb 28, 2023 - 12:00 a.m.

OpenJDK vulnerabilities

2023-02-2800:00:00
ubuntu.com
77
openjdk
ubuntu
security
vulnerabilities
serialization
corba
sandbox restrictions
sound subsystem
soundbank
cve-2023-21830
cve-2023-21843
packages
esm

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

47.2%

Releases

  • Ubuntu 22.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM

Packages

  • openjdk-8 - Open Source Java implementation

Details

It was discovered that the Serialization component of OpenJDK did not
properly handle the deserialization of some CORBA objects. An attacker
could possibly use this to bypass Java sandbox restrictions.
(CVE-2023-21830)

Markus Loewe discovered that the Java Sound subsystem in OpenJDK did not
properly validate the origin of a Soundbank. An attacker could use this to
specially craft an untrusted Java application or applet that could load a
Soundbank from an attacker controlled remote URL. (CVE-2023-21843)

OSVersionArchitecturePackageVersionFilename
Ubuntu22.10noarchopenjdk-8-jdk< 8u362-ga-0ubuntu1~22.10UNKNOWN
Ubuntu22.10noarchopenjdk-8-dbg< 8u362-ga-0ubuntu1~22.10UNKNOWN
Ubuntu22.10noarchopenjdk-8-demo< 8u362-ga-0ubuntu1~22.10UNKNOWN
Ubuntu22.10noarchopenjdk-8-doc< 8u362-ga-0ubuntu1~22.10UNKNOWN
Ubuntu22.10noarchopenjdk-8-jdk-headless< 8u362-ga-0ubuntu1~22.10UNKNOWN
Ubuntu22.10noarchopenjdk-8-jre< 8u362-ga-0ubuntu1~22.10UNKNOWN
Ubuntu22.10noarchopenjdk-8-jre-headless< 8u362-ga-0ubuntu1~22.10UNKNOWN
Ubuntu22.10noarchopenjdk-8-jre-zero< 8u362-ga-0ubuntu1~22.10UNKNOWN
Ubuntu22.10noarchopenjdk-8-source< 8u362-ga-0ubuntu1~22.10UNKNOWN
Ubuntu22.04noarchopenjdk-8-jdk< 8u362-ga-0ubuntu1~22.04UNKNOWN
Rows per page:
1-10 of 531

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

47.2%