![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.845269 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-5313-1) |
Summary: | The remote host is missing an update for the 'openjdk-17, openjdk-lts' package(s) announced via the USN-5313-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'openjdk-17, openjdk-lts' package(s) announced via the USN-5313-1 advisory. Vulnerability Insight: It was discovered that OpenJDK incorrectly handled deserialization filters. An attacker could possibly use this issue to insert, delete or obtain sensitive information. (CVE-2022-21248) It was discovered that OpenJDK incorrectly read uncompressed TIFF files. An attacker could possibly use this issue to cause a denial of service via a specially crafted TIFF file. (CVE-2022-21277) Jonni Passki discovered that OpenJDK incorrectly verified access restrictions when performing URI resolution. An attacker could possibly use this issue to obtain sensitive information. (CVE-2022-21282) It was discovered that OpenJDK incorrectly handled certain regular expressions in the Pattern class implementation. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-21283) It was discovered that OpenJDK incorrectly handled specially crafted Java class files. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-21291) Markus Loewe discovered that OpenJDK incorrectly validated attributes during object deserialization. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-21293, CVE-2022-21294) Dan Rabe discovered that OpenJDK incorrectly verified access permissions in the JAXP component. An attacker could possibly use this to specially craft an XML file to obtain sensitive information. (CVE-2022-21296) It was discovered that OpenJDK incorrectly handled XML entities. An attacker could use this to specially craft an XML file that, when parsed, would possibly cause a denial of service. (CVE-2022-21299) Zhiqiang Zang discovered that OpenJDK incorrectly handled array indexes. An attacker could possibly use this issue to obtain sensitive information. (CVE-2022-21305) It was discovered that OpenJDK incorrectly read very long attributes values in JAR file manifests. An attacker could possibly use this to specially craft JAR file to cause a denial of service. (CVE-2022-21340) It was discovered that OpenJDK incorrectly validated input from serialized streams. An attacker cold possibly use this issue to bypass sandbox restrictions. (CVE-2022-21341) Fabian Meumertzheim discovered that OpenJDK incorrectly handled certain specially crafted BMP or TIFF files. An attacker could possibly use this to cause a denial of service. (CVE-2022-21360, CVE-2022-21366) It was discovered that an integer overflow could be triggered in OpenJDK BMPImageReader class implementation. An attacker could possibly use this to specially craft a BMP file to cause a denial of service. (CVE-2022-21365) Affected Software/OS: 'openjdk-17, openjdk-lts' package(s) on Ubuntu 18.04, Ubuntu 20.04, Ubuntu 21.10. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-21248 DSA-5057 https://www.debian.org/security/2022/dsa-5057 DSA-5058 https://www.debian.org/security/2022/dsa-5058 FEDORA-2022-416be040a8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/ FEDORA-2022-477401b0f7 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/ FEDORA-2022-b706eef225 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/ GLSA-202209-05 https://security.gentoo.org/glsa/202209-05 [debian-lts-announce] 20220210 [SECURITY] [DLA 2917-1] openjdk-8 security update https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html https://security.netapp.com/advisory/ntap-20220121-0007/ https://www.oracle.com/security-alerts/cpujan2022.html Common Vulnerability Exposure (CVE) ID: CVE-2022-21277 Common Vulnerability Exposure (CVE) ID: CVE-2022-21282 Common Vulnerability Exposure (CVE) ID: CVE-2022-21283 Common Vulnerability Exposure (CVE) ID: CVE-2022-21291 Common Vulnerability Exposure (CVE) ID: CVE-2022-21293 Common Vulnerability Exposure (CVE) ID: CVE-2022-21294 Common Vulnerability Exposure (CVE) ID: CVE-2022-21296 Common Vulnerability Exposure (CVE) ID: CVE-2022-21299 Common Vulnerability Exposure (CVE) ID: CVE-2022-21305 Common Vulnerability Exposure (CVE) ID: CVE-2022-21340 Common Vulnerability Exposure (CVE) ID: CVE-2022-21341 Common Vulnerability Exposure (CVE) ID: CVE-2022-21360 Common Vulnerability Exposure (CVE) ID: CVE-2022-21365 Common Vulnerability Exposure (CVE) ID: CVE-2022-21366 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |