{"id":"USN-5388-1","summary":"openjdk-lts vulnerabilities","details":"It was discovered that OpenJDK incorrectly limited memory when compiling a\nspecially crafted XPath expression. An attacker could possibly use this\nissue to cause a denial of service. (CVE-2022-21426)\n\nIt was discovered that OpenJDK incorrectly handled converting certain\nobject arguments into their textual representations. An attacker could\npossibly use this issue to cause a denial of service. (CVE-2022-21434)\n\nIt was discovered that OpenJDK incorrectly validated the encoded length of\ncertain object identifiers. An attacker could possibly use this issue to\ncause a denial of service. (CVE-2022-21443)\n\nIt was discovered that OpenJDK incorrectly validated certain paths. An\nattacker could possibly use this issue to bypass the secure validation\nfeature and expose sensitive information in XML files. (CVE-2022-21476)\n\nIt was discovered that OpenJDK incorrectly parsed certain URI strings. An\nattacker could possibly use this issue to make applications accept\ninvalid of malformed URI strings. (CVE-2022-21496)\n","modified":"2026-02-10T04:42:35Z","published":"2022-04-26T11:49:20Z","related":["UBUNTU-CVE-2022-21426","UBUNTU-CVE-2022-21434","UBUNTU-CVE-2022-21443","UBUNTU-CVE-2022-21476","UBUNTU-CVE-2022-21496"],"upstream":["CVE-2022-21426","CVE-2022-21434","CVE-2022-21443","CVE-2022-21476","CVE-2022-21496","UBUNTU-CVE-2022-21426","UBUNTU-CVE-2022-21434","UBUNTU-CVE-2022-21443","UBUNTU-CVE-2022-21476","UBUNTU-CVE-2022-21496"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5388-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-21426"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-21434"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-21443"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-21476"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-21496"}],"affected":[{"package":{"name":"openjdk-lts","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/openjdk-lts@11.0.15+10-0ubuntu0.18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11.0.15+10-0ubuntu0.18.04.1"}]}],"versions":["9.0.4+12-2ubuntu4","9.0.4+12-4ubuntu1","10~46-4ubuntu1","10~46-5ubuntu1","10.0.1+10-1ubuntu2","10.0.1+10-3ubuntu1","10.0.2+13-1ubuntu0.18.04.1","10.0.2+13-1ubuntu0.18.04.2","10.0.2+13-1ubuntu0.18.04.3","10.0.2+13-1ubuntu0.18.04.4","11.0.2+9-3ubuntu1~18.04.3","11.0.3+7-1ubuntu2~18.04.1","11.0.4+11-1ubuntu2~18.04.3","11.0.5+10-0ubuntu1.1~18.04","11.0.6+10-1ubuntu1~18.04.1","11.0.7+10-2ubuntu2~18.04","11.0.8+10-0ubuntu1~18.04.1","11.0.9+11-0ubuntu1~18.04.1","11.0.9.1+1-0ubuntu1~18.04","11.0.10+9-0ubuntu1~18.04","11.0.11+9-0ubuntu2~18.04","11.0.13+8-0ubuntu1~18.04","11.0.14+9-0ubuntu2~18.04","11.0.14.1+1-0ubuntu1~18.04"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"11.0.15+10-0ubuntu0.18.04.1","binary_name":"openjdk-11-demo"},{"binary_version":"11.0.15+10-0ubuntu0.18.04.1","binary_name":"openjdk-11-jdk"},{"binary_version":"11.0.15+10-0ubuntu0.18.04.1","binary_name":"openjdk-11-jdk-headless"},{"binary_version":"11.0.15+10-0ubuntu0.18.04.1","binary_name":"openjdk-11-jre"},{"binary_version":"11.0.15+10-0ubuntu0.18.04.1","binary_name":"openjdk-11-jre-headless"},{"binary_version":"11.0.15+10-0ubuntu0.18.04.1","binary_name":"openjdk-11-jre-zero"},{"binary_version":"11.0.15+10-0ubuntu0.18.04.1","binary_name":"openjdk-11-source"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5388-1.json","cves_map":{"cves":[{"id":"CVE-2022-21426","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21434","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21443","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21476","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21496","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}},{"package":{"name":"openjdk-lts","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/openjdk-lts@11.0.15+10-0ubuntu0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11.0.15+10-0ubuntu0.20.04.1"}]}],"versions":["11.0.5+10-0ubuntu1","11.0.5+10-2ubuntu1","11.0.6+10-1ubuntu1","11.0.6+10-2ubuntu2","11.0.7+9-1ubuntu1","11.0.7+10-2ubuntu1","11.0.7+10-3ubuntu1","11.0.8+10-0ubuntu1~20.04","11.0.9+11-0ubuntu1~20.04","11.0.9.1+1-0ubuntu1~20.04","11.0.10+9-0ubuntu1~20.04","11.0.11+9-0ubuntu2~20.04","11.0.13+8-0ubuntu1~20.04","11.0.14+9-0ubuntu2~20.04","11.0.14.1+1-0ubuntu1~20.04"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"11.0.15+10-0ubuntu0.20.04.1","binary_name":"openjdk-11-demo"},{"binary_version":"11.0.15+10-0ubuntu0.20.04.1","binary_name":"openjdk-11-jdk"},{"binary_version":"11.0.15+10-0ubuntu0.20.04.1","binary_name":"openjdk-11-jdk-headless"},{"binary_version":"11.0.15+10-0ubuntu0.20.04.1","binary_name":"openjdk-11-jre"},{"binary_version":"11.0.15+10-0ubuntu0.20.04.1","binary_name":"openjdk-11-jre-headless"},{"binary_version":"11.0.15+10-0ubuntu0.20.04.1","binary_name":"openjdk-11-jre-zero"},{"binary_version":"11.0.15+10-0ubuntu0.20.04.1","binary_name":"openjdk-11-source"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5388-1.json","cves_map":{"cves":[{"id":"CVE-2022-21426","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21434","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21443","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21476","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21496","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:20.04:LTS"}}},{"package":{"name":"openjdk-lts","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/openjdk-lts@11.0.15+10-0ubuntu0.22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11.0.15+10-0ubuntu0.22.04.1"}]}],"versions":["11.0.12+7-0ubuntu3","11.0.13+8-0ubuntu1","11.0.14+9-0ubuntu2","11.0.14.1+1-0ubuntu1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"11.0.15+10-0ubuntu0.22.04.1","binary_name":"openjdk-11-demo"},{"binary_version":"11.0.15+10-0ubuntu0.22.04.1","binary_name":"openjdk-11-jdk"},{"binary_version":"11.0.15+10-0ubuntu0.22.04.1","binary_name":"openjdk-11-jdk-headless"},{"binary_version":"11.0.15+10-0ubuntu0.22.04.1","binary_name":"openjdk-11-jre"},{"binary_version":"11.0.15+10-0ubuntu0.22.04.1","binary_name":"openjdk-11-jre-headless"},{"binary_version":"11.0.15+10-0ubuntu0.22.04.1","binary_name":"openjdk-11-jre-zero"},{"binary_version":"11.0.15+10-0ubuntu0.22.04.1","binary_name":"openjdk-11-source"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5388-1.json","cves_map":{"cves":[{"id":"CVE-2022-21426","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21434","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21443","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21476","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21496","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.3"}