Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.845299
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-5313-2)
Summary:The remote host is missing an update for the 'openjdk-lts' package(s) announced via the USN-5313-2 advisory.
Description:Summary:
The remote host is missing an update for the 'openjdk-lts' package(s) announced via the USN-5313-2 advisory.

Vulnerability Insight:
USN-5313-1 fixed vulnerabilities and added features in OpenJDK.
Unfortunately, that update introduced a regression in OpenJDK 11 that
could impact interoperability with some popular HTTP/2 servers making
it unable to connect to said servers. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that OpenJDK incorrectly handled deserialization filters.
An attacker could possibly use this issue to insert, delete or obtain
sensitive information. (CVE-2022-21248)

It was discovered that OpenJDK incorrectly read uncompressed TIFF files.
An attacker could possibly use this issue to cause a denial of service via
a specially crafted TIFF file. (CVE-2022-21277)

Jonni Passki discovered that OpenJDK incorrectly verified access
restrictions when performing URI resolution. An attacker could possibly
use this issue to obtain sensitive information. (CVE-2022-21282)

It was discovered that OpenJDK incorrectly handled certain regular
expressions in the Pattern class implementation. An attacker could
possibly use this issue to cause a denial of service. (CVE-2022-21283)

It was discovered that OpenJDK incorrectly handled specially crafted Java
class files. An attacker could possibly use this issue to cause a denial
of service. (CVE-2022-21291)

Markus Loewe discovered that OpenJDK incorrectly validated attributes
during object deserialization. An attacker could possibly use this issue
to cause a denial of service. (CVE-2022-21293, CVE-2022-21294)

Dan Rabe discovered that OpenJDK incorrectly verified access permissions
in the JAXP component. An attacker could possibly use this to specially
craft an XML file to obtain sensitive information. (CVE-2022-21296)

It was discovered that OpenJDK incorrectly handled XML entities. An
attacker could use this to specially craft an XML file that, when parsed,
would possibly cause a denial of service. (CVE-2022-21299)

Zhiqiang Zang discovered that OpenJDK incorrectly handled array indexes.
An attacker could possibly use this issue to obtain sensitive information.
(CVE-2022-21305)

It was discovered that OpenJDK incorrectly read very long attributes
values in JAR file manifests. An attacker could possibly use this to
specially craft JAR file to cause a denial of service. (CVE-2022-21340)

It was discovered that OpenJDK incorrectly validated input from serialized
streams. An attacker cold possibly use this issue to bypass sandbox
restrictions. (CVE-2022-21341)

Fabian Meumertzheim discovered that OpenJDK incorrectly handled certain
specially crafted BMP or TIFF files. An attacker could possibly use this
to cause a denial of service. (CVE-2022-21360, CVE-2022-21366)

It was discovered that an integer overflow could be triggered in OpenJDK
BMPImageReader class implementation. An attacker could possibly use this
to specially craft a BMP file to cause a denial of service.
(CVE-2022-21365)

Affected Software/OS:
'openjdk-lts' package(s) on Ubuntu 18.04, Ubuntu 20.04, Ubuntu 21.10.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-21248
DSA-5057
https://www.debian.org/security/2022/dsa-5057
DSA-5058
https://www.debian.org/security/2022/dsa-5058
FEDORA-2022-416be040a8
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
FEDORA-2022-477401b0f7
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
FEDORA-2022-b706eef225
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
GLSA-202209-05
https://security.gentoo.org/glsa/202209-05
[debian-lts-announce] 20220210 [SECURITY] [DLA 2917-1] openjdk-8 security update
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://security.netapp.com/advisory/ntap-20220121-0007/
https://www.oracle.com/security-alerts/cpujan2022.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-21277
Common Vulnerability Exposure (CVE) ID: CVE-2022-21282
Common Vulnerability Exposure (CVE) ID: CVE-2022-21283
Common Vulnerability Exposure (CVE) ID: CVE-2022-21291
Common Vulnerability Exposure (CVE) ID: CVE-2022-21293
Common Vulnerability Exposure (CVE) ID: CVE-2022-21294
Common Vulnerability Exposure (CVE) ID: CVE-2022-21296
Common Vulnerability Exposure (CVE) ID: CVE-2022-21299
Common Vulnerability Exposure (CVE) ID: CVE-2022-21305
Common Vulnerability Exposure (CVE) ID: CVE-2022-21340
Common Vulnerability Exposure (CVE) ID: CVE-2022-21341
Common Vulnerability Exposure (CVE) ID: CVE-2022-21360
Common Vulnerability Exposure (CVE) ID: CVE-2022-21365
Common Vulnerability Exposure (CVE) ID: CVE-2022-21366
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.