Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-22067

Published: 17 October 2023

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: CORBA). Supported versions that are affected are Oracle Java SE: 8u381, 8u381-perf; Oracle GraalVM Enterprise Edition: 20.3.11 and 21.3.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via CORBA to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).

From the Ubuntu Security Team

It was discovered that the CORBA implementation in OpenJDK did not properly perform deserialization of IOR string objects. An attacker could possibly use this to bypass Java sandbox restrictions.

Notes

AuthorNote
mdeslaur
8.x only
sbeattie
see Oracle OpenJDK-8 release notes discussions
around this issue, and the introduced system property
com.sun.CORBA.IDL.Stubs.allowCorbanameInIOR

Priority

Medium

Cvss 3 Severity Score

5.3

Score breakdown

Status

Package Release Status
openjdk-13
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Ignored
(superseded by openjdk-17)
jammy Does not exist

lunar Does not exist

mantic Does not exist

trusty Does not exist

upstream Not vulnerable
(8.x only)
xenial Does not exist

openjdk-16
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Ignored
(superseded by openjdk-17)
jammy Does not exist

lunar Does not exist

mantic Does not exist

trusty Does not exist

upstream Not vulnerable
(8.x only)
xenial Does not exist

openjdk-17
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(8.x only)
focal Not vulnerable
(8.x only)
jammy Not vulnerable
(8.x only)
lunar Not vulnerable
(8.x only)
mantic Not vulnerable
(8.x only)
trusty Does not exist

upstream Not vulnerable
(8.x only)
xenial Does not exist

openjdk-18
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

jammy Ignored
(superseded by openjdk-19)
lunar Ignored
(superseded by openjdk-19)
mantic Does not exist

trusty Does not exist

upstream Not vulnerable
(8.x only)
xenial Does not exist

openjdk-19
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

jammy Ignored
(no longer supported by upstream)
lunar Ignored
(superseded by openjdk-20)
mantic Ignored
(superseded by openjdk-20)
trusty Does not exist

upstream Not vulnerable
(8.x only)
xenial Does not exist

openjdk-20
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

jammy Does not exist

lunar Not vulnerable
(8.x only)
mantic Not vulnerable
(8.x only)
trusty Does not exist

upstream Not vulnerable
(8.x only)
xenial Does not exist

openjdk-21
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Not vulnerable
(8.x only)
jammy Not vulnerable
(8.x only)
lunar Not vulnerable
(8.x only)
mantic Not vulnerable
(8.x only)
trusty Does not exist

upstream Not vulnerable
(8.x only)
xenial Does not exist

openjdk-22
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

jammy Does not exist

lunar Does not exist

mantic Not vulnerable
(8.x only)
trusty Does not exist

upstream Not vulnerable
(8.x only)
xenial Does not exist

openjdk-8
Launchpad, Ubuntu, Debian
bionic
Released (8u392-ga-1~18.04)
Available with Ubuntu Pro
focal
Released (8u392-ga-1~20.04)
jammy
Released (8u392-ga-1~22.04)
lunar
Released (8u392-ga-1~23.04)
mantic
Released (8u392-ga-1~23.10)
trusty Does not exist

upstream Needs triage

xenial
Released (8u392-ga-1~16.04)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
Patches:
upstream: https://github.com/openjdk/jdk8u/commit/6930f190778e62c88ee0d7d382f61515031563e4
openjdk-9
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

jammy Does not exist

lunar Does not exist

mantic Does not exist

trusty Does not exist

upstream Not vulnerable
(8.x only)
xenial Ignored
(no longer supported by upstream)
openjdk-lts
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(8.x only)
focal Not vulnerable
(8.x only)
jammy Not vulnerable
(8.x only)
lunar Not vulnerable
(8.x only)
mantic Not vulnerable
(8.x only)
trusty Does not exist

upstream Not vulnerable
(8.x only)
xenial Does not exist

Severity score breakdown

Parameter Value
Base score 5.3
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N