{"id":"USN-5313-2","summary":"openjdk-lts regression","details":"USN-5313-1 fixed vulnerabilities and added features in OpenJDK.\nUnfortunately, that update introduced a regression in OpenJDK 11 that\ncould impact interoperability with some popular HTTP/2 servers making\nit unable to connect to said servers. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\n It was discovered that OpenJDK incorrectly handled deserialization filters.\n An attacker could possibly use this issue to insert, delete or obtain\n sensitive information. (CVE-2022-21248)\n\n It was discovered that OpenJDK incorrectly read uncompressed TIFF files.\n An attacker could possibly use this issue to cause a denial of service via\n a specially crafted TIFF file. (CVE-2022-21277)\n\n Jonni Passki discovered that OpenJDK incorrectly verified access\n restrictions when performing URI resolution. An attacker could possibly\n use this issue to obtain sensitive information. (CVE-2022-21282)\n\n It was discovered that OpenJDK incorrectly handled certain regular\n expressions in the Pattern class implementation. An attacker could\n possibly use this issue to cause a denial of service. (CVE-2022-21283)\n\n It was discovered that OpenJDK incorrectly handled specially crafted Java\n class files. An attacker could possibly use this issue to cause a denial\n of service. (CVE-2022-21291)\n\n Markus Loewe discovered that OpenJDK incorrectly validated attributes\n during object deserialization. An attacker could possibly use this issue\n to cause a denial of service. (CVE-2022-21293, CVE-2022-21294)\n\n Dan Rabe discovered that OpenJDK incorrectly verified access permissions\n in the JAXP component. An attacker could possibly use this to specially\n craft an XML file to obtain sensitive information. (CVE-2022-21296)\n\n It was discovered that OpenJDK incorrectly handled XML entities. An\n attacker could use this to specially craft an XML file that, when parsed,\n would possibly cause a denial of service. (CVE-2022-21299)\n\n Zhiqiang Zang discovered that OpenJDK incorrectly handled array indexes.\n An attacker could possibly use this issue to obtain sensitive information.\n (CVE-2022-21305)\n\n It was discovered that OpenJDK incorrectly read very long attributes\n values in JAR file manifests. An attacker could possibly use this to\n specially craft JAR file to cause a denial of service. (CVE-2022-21340)\n\n It was discovered that OpenJDK incorrectly validated input from serialized\n streams. An attacker cold possibly use this issue to bypass sandbox\n restrictions. (CVE-2022-21341)\n\n Fabian Meumertzheim discovered that OpenJDK incorrectly handled certain\n specially crafted BMP or TIFF files. An attacker could possibly use this\n to cause a denial of service. (CVE-2022-21360, CVE-2022-21366)\n\n It was discovered that an integer overflow could be triggered in OpenJDK\n BMPImageReader class implementation. An attacker could possibly use this\n to specially craft a BMP file to cause a denial of service.\n (CVE-2022-21365)\n","modified":"2026-02-10T04:42:30Z","published":"2022-03-29T10:06:48Z","related":["UBUNTU-CVE-2022-21248","UBUNTU-CVE-2022-21277","UBUNTU-CVE-2022-21282","UBUNTU-CVE-2022-21283","UBUNTU-CVE-2022-21291","UBUNTU-CVE-2022-21293","UBUNTU-CVE-2022-21294","UBUNTU-CVE-2022-21296","UBUNTU-CVE-2022-21299","UBUNTU-CVE-2022-21305","UBUNTU-CVE-2022-21340","UBUNTU-CVE-2022-21341","UBUNTU-CVE-2022-21360","UBUNTU-CVE-2022-21365","UBUNTU-CVE-2022-21366"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5313-2"},{"type":"REPORT","url":"https://launchpad.net/bugs/1966338"}],"affected":[{"package":{"name":"openjdk-lts","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/openjdk-lts@11.0.14.1+1-0ubuntu1~18.04?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11.0.14.1+1-0ubuntu1~18.04"}]}],"versions":["9.0.4+12-2ubuntu4","9.0.4+12-4ubuntu1","10~46-4ubuntu1","10~46-5ubuntu1","10.0.1+10-1ubuntu2","10.0.1+10-3ubuntu1","10.0.2+13-1ubuntu0.18.04.1","10.0.2+13-1ubuntu0.18.04.2","10.0.2+13-1ubuntu0.18.04.3","10.0.2+13-1ubuntu0.18.04.4","11.0.2+9-3ubuntu1~18.04.3","11.0.3+7-1ubuntu2~18.04.1","11.0.4+11-1ubuntu2~18.04.3","11.0.5+10-0ubuntu1.1~18.04","11.0.6+10-1ubuntu1~18.04.1","11.0.7+10-2ubuntu2~18.04","11.0.8+10-0ubuntu1~18.04.1","11.0.9+11-0ubuntu1~18.04.1","11.0.9.1+1-0ubuntu1~18.04","11.0.10+9-0ubuntu1~18.04","11.0.11+9-0ubuntu2~18.04","11.0.13+8-0ubuntu1~18.04","11.0.14+9-0ubuntu2~18.04"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"openjdk-11-demo","binary_version":"11.0.14.1+1-0ubuntu1~18.04"},{"binary_name":"openjdk-11-jdk","binary_version":"11.0.14.1+1-0ubuntu1~18.04"},{"binary_name":"openjdk-11-jdk-headless","binary_version":"11.0.14.1+1-0ubuntu1~18.04"},{"binary_name":"openjdk-11-jre","binary_version":"11.0.14.1+1-0ubuntu1~18.04"},{"binary_name":"openjdk-11-jre-headless","binary_version":"11.0.14.1+1-0ubuntu1~18.04"},{"binary_name":"openjdk-11-jre-zero","binary_version":"11.0.14.1+1-0ubuntu1~18.04"},{"binary_name":"openjdk-11-source","binary_version":"11.0.14.1+1-0ubuntu1~18.04"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5313-2.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[]}}},{"package":{"name":"openjdk-lts","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/openjdk-lts@11.0.14.1+1-0ubuntu1~20.04?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11.0.14.1+1-0ubuntu1~20.04"}]}],"versions":["11.0.5+10-0ubuntu1","11.0.5+10-2ubuntu1","11.0.6+10-1ubuntu1","11.0.6+10-2ubuntu2","11.0.7+9-1ubuntu1","11.0.7+10-2ubuntu1","11.0.7+10-3ubuntu1","11.0.8+10-0ubuntu1~20.04","11.0.9+11-0ubuntu1~20.04","11.0.9.1+1-0ubuntu1~20.04","11.0.10+9-0ubuntu1~20.04","11.0.11+9-0ubuntu2~20.04","11.0.13+8-0ubuntu1~20.04","11.0.14+9-0ubuntu2~20.04"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"openjdk-11-demo","binary_version":"11.0.14.1+1-0ubuntu1~20.04"},{"binary_name":"openjdk-11-jdk","binary_version":"11.0.14.1+1-0ubuntu1~20.04"},{"binary_name":"openjdk-11-jdk-headless","binary_version":"11.0.14.1+1-0ubuntu1~20.04"},{"binary_name":"openjdk-11-jre","binary_version":"11.0.14.1+1-0ubuntu1~20.04"},{"binary_name":"openjdk-11-jre-headless","binary_version":"11.0.14.1+1-0ubuntu1~20.04"},{"binary_name":"openjdk-11-jre-zero","binary_version":"11.0.14.1+1-0ubuntu1~20.04"},{"binary_name":"openjdk-11-source","binary_version":"11.0.14.1+1-0ubuntu1~20.04"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5313-2.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[]}}}],"schema_version":"1.7.3"}