USN-6263-2

Source
https://ubuntu.com/security/notices/USN-6263-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6263-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6263-2
Published
2023-08-30T10:45:56Z
Modified
2026-02-10T04:43:14Z
Summary
openjdk-lts, openjdk-17 regression
Details

USN-6263-1 fixed vulnerabilities in OpenJDK. Unfortunately, that update introduced a regression when opening APK, ZIP or JAR files in OpenJDK 11 and OpenJDK 17. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Motoyasu Saburi discovered that OpenJDK incorrectly handled special characters in file name parameters. An attacker could possibly use this issue to insert, edit or obtain sensitive information. This issue only affected OpenJDK 11 and OpenJDK 17. (CVE-2023-22006)

Eirik Bjørsnøs discovered that OpenJDK incorrectly handled certain ZIP archives. An attacker could possibly use this issue to cause a denial of service. This issue only affected OpenJDK 11 and OpenJDK 17. (CVE-2023-22036)

David Stancu discovered that OpenJDK had a flaw in the AES cipher implementation. An attacker could possibly use this issue to obtain sensitive information. This issue only affected OpenJDK 11 and OpenJDK 17. (CVE-2023-22041)

Zhiqiang Zang discovered that OpenJDK incorrectly handled array accesses when using the binary '%' operator. An attacker could possibly use this issue to obtain sensitive information. This issue only affected OpenJDK 17. (CVE-2023-22044)

Zhiqiang Zang discovered that OpenJDK incorrectly handled array accesses. An attacker could possibly use this issue to obtain sensitive information. (CVE-2023-22045)

It was discovered that OpenJDK incorrectly sanitized URIs strings. An attacker could possibly use this issue to insert, edit or obtain sensitive information. (CVE-2023-22049)

It was discovered that OpenJDK incorrectly handled certain glyphs. An attacker could possibly use this issue to cause a denial of service. This issue only affected OpenJDK 11 and OpenJDK 17. (CVE-2023-25193)

References

Affected packages

Ubuntu:20.04:LTS
openjdk-17

Package

Name
openjdk-17
Purl
pkg:deb/ubuntu/openjdk-17@17.0.8.1+1~us1-0ubuntu1~20.04?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
17.0.8.1+1~us1-0ubuntu1~20.04

Affected versions

17+35-1~20.*
17+35-1~20.04
17.*
17.0.1+12-1~20.04
17.0.2+8-1~20.04
17.0.3+7-0ubuntu0.20.04.1
17.0.4+8-1~20.04
17.0.5+8-2ubuntu1~20.04
17.0.6+10-0ubuntu1~20.04.1
17.0.7+7~us1-0ubuntu1~20.04
17.0.8+7-1~20.04.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "openjdk-17-demo",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~20.04"
        },
        {
            "binary_name": "openjdk-17-jdk",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~20.04"
        },
        {
            "binary_name": "openjdk-17-jdk-headless",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~20.04"
        },
        {
            "binary_name": "openjdk-17-jre",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~20.04"
        },
        {
            "binary_name": "openjdk-17-jre-headless",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~20.04"
        },
        {
            "binary_name": "openjdk-17-jre-zero",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~20.04"
        },
        {
            "binary_name": "openjdk-17-source",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~20.04"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6263-2.json"
cves_map
{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": []
}
openjdk-lts

Package

Name
openjdk-lts
Purl
pkg:deb/ubuntu/openjdk-lts@11.0.20.1+1-0ubuntu1~20.04?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
11.0.20.1+1-0ubuntu1~20.04

Affected versions

11.*
11.0.5+10-0ubuntu1
11.0.5+10-2ubuntu1
11.0.6+10-1ubuntu1
11.0.6+10-2ubuntu2
11.0.7+9-1ubuntu1
11.0.7+10-2ubuntu1
11.0.7+10-3ubuntu1
11.0.8+10-0ubuntu1~20.04
11.0.9+11-0ubuntu1~20.04
11.0.9.1+1-0ubuntu1~20.04
11.0.10+9-0ubuntu1~20.04
11.0.11+9-0ubuntu2~20.04
11.0.13+8-0ubuntu1~20.04
11.0.14+9-0ubuntu2~20.04
11.0.14.1+1-0ubuntu1~20.04
11.0.15+10-0ubuntu0.20.04.1
11.0.16+8-0ubuntu1~20.04
11.0.17+8-1ubuntu2~20.04
11.0.18+10-0ubuntu1~20.04.1
11.0.19+7~us1-0ubuntu1~20.04.1
11.0.20+8-1ubuntu1~20.04

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "openjdk-11-demo",
            "binary_version": "11.0.20.1+1-0ubuntu1~20.04"
        },
        {
            "binary_name": "openjdk-11-jdk",
            "binary_version": "11.0.20.1+1-0ubuntu1~20.04"
        },
        {
            "binary_name": "openjdk-11-jdk-headless",
            "binary_version": "11.0.20.1+1-0ubuntu1~20.04"
        },
        {
            "binary_name": "openjdk-11-jre",
            "binary_version": "11.0.20.1+1-0ubuntu1~20.04"
        },
        {
            "binary_name": "openjdk-11-jre-headless",
            "binary_version": "11.0.20.1+1-0ubuntu1~20.04"
        },
        {
            "binary_name": "openjdk-11-jre-zero",
            "binary_version": "11.0.20.1+1-0ubuntu1~20.04"
        },
        {
            "binary_name": "openjdk-11-source",
            "binary_version": "11.0.20.1+1-0ubuntu1~20.04"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6263-2.json"
cves_map
{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": []
}
Ubuntu:22.04:LTS
openjdk-17

Package

Name
openjdk-17
Purl
pkg:deb/ubuntu/openjdk-17@17.0.8.1+1~us1-0ubuntu1~22.04?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
17.0.8.1+1~us1-0ubuntu1~22.04

Affected versions

Other
17+35-1
17.*
17.0.1+12-1
17.0.2+8-1
17.0.3+7-0ubuntu0.22.04.1
17.0.4+8-1~22.04
17.0.5+8-2ubuntu1~22.04
17.0.6+10-0ubuntu1~22.04
17.0.7+7~us1-0ubuntu1~22.04.2
17.0.8+7-1~22.04

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "openjdk-17-demo",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~22.04"
        },
        {
            "binary_name": "openjdk-17-jdk",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~22.04"
        },
        {
            "binary_name": "openjdk-17-jdk-headless",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~22.04"
        },
        {
            "binary_name": "openjdk-17-jre",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~22.04"
        },
        {
            "binary_name": "openjdk-17-jre-headless",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~22.04"
        },
        {
            "binary_name": "openjdk-17-jre-zero",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~22.04"
        },
        {
            "binary_name": "openjdk-17-source",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~22.04"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6263-2.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": []
}
openjdk-lts

Package

Name
openjdk-lts
Purl
pkg:deb/ubuntu/openjdk-lts@11.0.20.1+1-0ubuntu1~22.04?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
11.0.20.1+1-0ubuntu1~22.04

Affected versions

11.*
11.0.12+7-0ubuntu3
11.0.13+8-0ubuntu1
11.0.14+9-0ubuntu2
11.0.14.1+1-0ubuntu1
11.0.15+10-0ubuntu0.22.04.1
11.0.16+8-0ubuntu1~22.04
11.0.17+8-1ubuntu2~22.04
11.0.18+10-0ubuntu1~22.04
11.0.19+7~us1-0ubuntu1~22.04.1
11.0.20+8-1ubuntu1~22.04

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "openjdk-11-demo",
            "binary_version": "11.0.20.1+1-0ubuntu1~22.04"
        },
        {
            "binary_name": "openjdk-11-jdk",
            "binary_version": "11.0.20.1+1-0ubuntu1~22.04"
        },
        {
            "binary_name": "openjdk-11-jdk-headless",
            "binary_version": "11.0.20.1+1-0ubuntu1~22.04"
        },
        {
            "binary_name": "openjdk-11-jre",
            "binary_version": "11.0.20.1+1-0ubuntu1~22.04"
        },
        {
            "binary_name": "openjdk-11-jre-headless",
            "binary_version": "11.0.20.1+1-0ubuntu1~22.04"
        },
        {
            "binary_name": "openjdk-11-jre-zero",
            "binary_version": "11.0.20.1+1-0ubuntu1~22.04"
        },
        {
            "binary_name": "openjdk-11-source",
            "binary_version": "11.0.20.1+1-0ubuntu1~22.04"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6263-2.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": []
}
Ubuntu:Pro:18.04:LTS
openjdk-lts

Package

Name
openjdk-lts
Purl
pkg:deb/ubuntu/openjdk-lts@11.0.20.1+1-0ubuntu1~18.04?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
11.0.20.1+1-0ubuntu1~18.04

Affected versions

9.*
9.0.4+12-2ubuntu4
9.0.4+12-4ubuntu1
Other
10~46-4ubuntu1
10~46-5ubuntu1
10.*
10.0.1+10-1ubuntu2
10.0.1+10-3ubuntu1
10.0.2+13-1ubuntu0.18.04.1
10.0.2+13-1ubuntu0.18.04.2
10.0.2+13-1ubuntu0.18.04.3
10.0.2+13-1ubuntu0.18.04.4
11.*
11.0.2+9-3ubuntu1~18.04.3
11.0.3+7-1ubuntu2~18.04.1
11.0.4+11-1ubuntu2~18.04.3
11.0.5+10-0ubuntu1.1~18.04
11.0.6+10-1ubuntu1~18.04.1
11.0.7+10-2ubuntu2~18.04
11.0.8+10-0ubuntu1~18.04.1
11.0.9+11-0ubuntu1~18.04.1
11.0.9.1+1-0ubuntu1~18.04
11.0.10+9-0ubuntu1~18.04
11.0.11+9-0ubuntu2~18.04
11.0.13+8-0ubuntu1~18.04
11.0.14+9-0ubuntu2~18.04
11.0.14.1+1-0ubuntu1~18.04
11.0.15+10-0ubuntu0.18.04.1
11.0.16+8-0ubuntu1~18.04
11.0.17+8-1ubuntu2~18.04
11.0.18+10-0ubuntu1~18.04.1
11.0.19+7~us1-0ubuntu1~18.04.1
11.0.20+8-1ubuntu1~18.04

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "openjdk-11-demo",
            "binary_version": "11.0.20.1+1-0ubuntu1~18.04"
        },
        {
            "binary_name": "openjdk-11-jdk",
            "binary_version": "11.0.20.1+1-0ubuntu1~18.04"
        },
        {
            "binary_name": "openjdk-11-jdk-headless",
            "binary_version": "11.0.20.1+1-0ubuntu1~18.04"
        },
        {
            "binary_name": "openjdk-11-jre",
            "binary_version": "11.0.20.1+1-0ubuntu1~18.04"
        },
        {
            "binary_name": "openjdk-11-jre-headless",
            "binary_version": "11.0.20.1+1-0ubuntu1~18.04"
        },
        {
            "binary_name": "openjdk-11-jre-zero",
            "binary_version": "11.0.20.1+1-0ubuntu1~18.04"
        },
        {
            "binary_name": "openjdk-11-source",
            "binary_version": "11.0.20.1+1-0ubuntu1~18.04"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6263-2.json"
cves_map
{
    "ecosystem": "Ubuntu:Pro:18.04:LTS",
    "cves": []
}
openjdk-17

Package

Name
openjdk-17
Purl
pkg:deb/ubuntu/openjdk-17@17.0.8.1+1~us1-0ubuntu1~18.04?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
17.0.8.1+1~us1-0ubuntu1~18.04

Affected versions

17+35-1~18.*
17+35-1~18.04
17.*
17.0.1+12-1~18.04
17.0.2+8-1~18.04
17.0.3+7-0ubuntu0.18.04.1
17.0.4+8-1~18.04
17.0.5+8-2ubuntu1~18.04
17.0.6+10-0ubuntu1~18.04.1
17.0.7+7~us1-0ubuntu1~18.04
17.0.8+7-1~18.04

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "openjdk-17-demo",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~18.04"
        },
        {
            "binary_name": "openjdk-17-jdk",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~18.04"
        },
        {
            "binary_name": "openjdk-17-jdk-headless",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~18.04"
        },
        {
            "binary_name": "openjdk-17-jre",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~18.04"
        },
        {
            "binary_name": "openjdk-17-jre-headless",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~18.04"
        },
        {
            "binary_name": "openjdk-17-jre-zero",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~18.04"
        },
        {
            "binary_name": "openjdk-17-source",
            "binary_version": "17.0.8.1+1~us1-0ubuntu1~18.04"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6263-2.json"
cves_map
{
    "ecosystem": "Ubuntu:Pro:18.04:LTS",
    "cves": []
}