Ubuntu alert USN-7483-1 (openjdk-21)
From: | Evan Caville <evan.caville@canonical.com> | |
To: | ubuntu-security-announce@lists.ubuntu.com | |
Subject: | [USN-7483-1] OpenJDK 21 vulnerabilities | |
Date: | Tue, 06 May 2025 14:25:18 +1000 | |
Message-ID: | <12df5ea3-3bfe-445a-ab2c-10fe7e402329@canonical.com> |
========================================================================== Ubuntu Security Notice USN-7483-1 May 06, 2025 openjdk-21 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.04 - Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in OpenJDK 21. Software Description: - openjdk-21: Open Source Java implementation Details: Alicja Kario discovered that the JSSE component of OpenJDK 21 incorrectly handled RSA padding. An Attacker could possibly use this issue to obtain sensitive information. (CVE-2025-21587) It was discovered that the Compiler component of OpenJDK 21 incorrectly handled compiler transformations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30691) It was discovered that the 2D component of OpenJDK 21 did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30698) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2025-... Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.04 openjdk-21-jdk 21.0.7+6~us1-0ubuntu1~25.04 openjdk-21-jdk-headless 21.0.7+6~us1-0ubuntu1~25.04 openjdk-21-jre 21.0.7+6~us1-0ubuntu1~25.04 openjdk-21-jre-headless 21.0.7+6~us1-0ubuntu1~25.04 openjdk-21-jre-zero 21.0.7+6~us1-0ubuntu1~25.04 Ubuntu 24.10 openjdk-21-jdk 21.0.7+6~us1-0ubuntu1~24.10 openjdk-21-jdk-headless 21.0.7+6~us1-0ubuntu1~24.10 openjdk-21-jre 21.0.7+6~us1-0ubuntu1~24.10 openjdk-21-jre-headless 21.0.7+6~us1-0ubuntu1~24.10 openjdk-21-jre-zero 21.0.7+6~us1-0ubuntu1~24.10 Ubuntu 24.04 LTS openjdk-21-jdk 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jdk-headless 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jre 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jre-headless 21.0.7+6~us1-0ubuntu1~24.04 openjdk-21-jre-zero 21.0.7+6~us1-0ubuntu1~24.04 Ubuntu 22.04 LTS openjdk-21-jdk 21.0.7+6~us1-0ubuntu1~22.04 openjdk-21-jdk-headless 21.0.7+6~us1-0ubuntu1~22.04 openjdk-21-jre 21.0.7+6~us1-0ubuntu1~22.04 openjdk-21-jre-headless 21.0.7+6~us1-0ubuntu1~22.04 openjdk-21-jre-zero 21.0.7+6~us1-0ubuntu1~22.04 Ubuntu 20.04 LTS openjdk-21-jdk 21.0.7+6~us1-0ubuntu1~20.04 openjdk-21-jdk-headless 21.0.7+6~us1-0ubuntu1~20.04 openjdk-21-jre 21.0.7+6~us1-0ubuntu1~20.04 openjdk-21-jre-headless 21.0.7+6~us1-0ubuntu1~20.04 openjdk-21-jre-zero 21.0.7+6~us1-0ubuntu1~20.04 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart Java applications to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7483-1 CVE-2025-21587, CVE-2025-30691, CVE-2025-30698 Package Information: https://launchpad.net/ubuntu/+source/openjdk-21/21.0.7+6~... https://launchpad.net/ubuntu/+source/openjdk-21/21.0.7+6~... https://launchpad.net/ubuntu/+source/openjdk-21/21.0.7+6~... https://launchpad.net/ubuntu/+source/openjdk-21/21.0.7+6~... https://launchpad.net/ubuntu/+source/openjdk-21/21.0.7+6~...
Attachment: OpenPGP_signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- wsF5BAABCAAjFiEEAPYWTpwtIbr7xH4OWNrRIKaTkWcFAmgZjy4FAwAAAAAACgkQWNrRIKaTkWen hxAAw5+XudFBLpB4M2yGx2UOpNhmgFuyl5vXIbvBnKX4DOQb7X8hg0s6hlFf7acbq4KBhnSSFOsL o8Rv0JffeZcDdt+n78RhJejxJV2RXj3QGqxjlmqwRvP558GK2DjZ+GDQyKSFkbMkm8TVmz9CaRLj M063iy5wfLoM79p35EZ/ooBEDk5cjqTAZK/Bv+GSpJotZWJdfd+Y0YtiYC0Kqc8G1t4SPpDhvv8v Poc1DFxUA/tccCl9/NN59FTsW9JyG62eU4t5F6wI/YieSFWJvnByTZAxkTExntopJIFsj04yAKh/ zwmqXXVUk4VRN81b8HfNmKD1UVwo+rAL4kQrovCKH6EtK7AVsSNh39w78aUq+e1dygH/FGmEV5oR HECP1NBtALx3M6IpLsCDT51bowW2PofAyho6l38AtGeoCI34CJaVLd2yQfRczIMXls8OMIIHKh2w yqZo5raMxhupHsrNrejF/IAMPiqs6DNmL4nrLfnesoS7VHkiY53ClLRmOJ3VmoBIZ77cQFFXC7Az NgdzSwCwhKn3TGlObDmsulNTxPfZvrJci3R6SFEMNt1tWtGmgFO3plj+6sYAA+mH5PSHsWbSij5O Y17FbTPpybA3J4UIfTrpvkyMSLOYCSpkOuCMORmHx5XV30FgIL+bxEOFgDACHjFJ97+eIyf4qtTy Y3w= =vnXI -----END PGP SIGNATURE-----
Attachment: None (type=text/plain)