Ubuntu alert USN-7998-1 (openjdk-17)
| From: | noreply+usn-bot@canonical.com | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-7998-1] OpenJDK 17 vulnerabilities | |
| Date: | Tue, 03 Feb 2026 12:14:38 +0000 | |
| Message-ID: | <E1vnFIk-0007Zw-3L@lists.ubuntu.com> |
========================================================================== Ubuntu Security Notice USN-7998-1 February 03, 2026 openjdk-17 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in OpenJDK 17. Software Description: - openjdk-17: Open Source Java implementation Details: It was discovered that the RMI component of OpenJDK 17 would establish RMI TCP endpoint connections to a remote host without setting an endpoint identification algorithm. An unauthenticated remote attacker could possibly use this issue to steal sensitive information. (CVE-2026-21925) Mingijung discovered that the AWT and JavaFX componenets of OpenJDK 17 could run programs if Desktop.browse() was supplied a filename as a URI. An unauthenticated remote attacker could possibly use this issue to execute arbitrary code. (CVE-2026-21932) Zhihui Chen discovered that the Networking component of OpenJDK 17 was suceptible to a CRLF injection vulnerability via the HttpServer class. An unauthenticated remote attacker could possibly use this issue to modify files or leak sensitive information. (CVE-2026-21933) Ireneusz Pastusiak discovered that the Security component of OpenJDK 17 failed to verify provided URIs point to a legitimate source when AIA is enabled. An unauthenticated remote attacker could possibly use this issue to redirect users to malicious hosts. (CVE-2026-21945) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2026-... Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.10 openjdk-17-jdk 17.0.18+8-1~25.10.1 openjdk-17-jdk-headless 17.0.18+8-1~25.10.1 openjdk-17-jre 17.0.18+8-1~25.10.1 openjdk-17-jre-headless 17.0.18+8-1~25.10.1 openjdk-17-jre-zero 17.0.18+8-1~25.10.1 Ubuntu 24.04 LTS openjdk-17-jdk 17.0.18+8-1~24.04.1 openjdk-17-jdk-headless 17.0.18+8-1~24.04.1 openjdk-17-jre 17.0.18+8-1~24.04.1 openjdk-17-jre-headless 17.0.18+8-1~24.04.1 openjdk-17-jre-zero 17.0.18+8-1~24.04.1 Ubuntu 22.04 LTS openjdk-17-jdk 17.0.18+8-1~22.04.1 openjdk-17-jdk-headless 17.0.18+8-1~22.04.1 openjdk-17-jre 17.0.18+8-1~22.04.1 openjdk-17-jre-headless 17.0.18+8-1~22.04.1 openjdk-17-jre-zero 17.0.18+8-1~22.04.1 Ubuntu 20.04 LTS openjdk-17-jdk 17.0.18+8-1~20.04 Available with Ubuntu Pro openjdk-17-jdk-headless 17.0.18+8-1~20.04 Available with Ubuntu Pro openjdk-17-jre 17.0.18+8-1~20.04 Available with Ubuntu Pro openjdk-17-jre-headless 17.0.18+8-1~20.04 Available with Ubuntu Pro openjdk-17-jre-zero 17.0.18+8-1~20.04 Available with Ubuntu Pro Ubuntu 18.04 LTS openjdk-17-jdk 17.0.18+8-1~18.04 Available with Ubuntu Pro openjdk-17-jdk-headless 17.0.18+8-1~18.04 Available with Ubuntu Pro openjdk-17-jre 17.0.18+8-1~18.04 Available with Ubuntu Pro openjdk-17-jre-headless 17.0.18+8-1~18.04 Available with Ubuntu Pro openjdk-17-jre-zero 17.0.18+8-1~18.04 Available with Ubuntu Pro This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart Java applications to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7998-1 CVE-2026-21925, CVE-2026-21932, CVE-2026-21933, CVE-2026-21945 Package Information: https://launchpad.net/ubuntu/+source/openjdk-17/17.0.18+8... https://launchpad.net/ubuntu/+source/openjdk-17/17.0.18+8... https://launchpad.net/ubuntu/+source/openjdk-17/17.0.18+8...
Attachment: signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmmB5kkACgkQcpJm3tlz hgEgFg/+K3J2isQIfhPagTrR1WJfXKQEAZ4Rzjf1S5coXCdqtrVjUbk3mgQYPAan im2rPQwKqo7cj0/1Lz3VYCW7HqUNABKqNhzeashVNG3n6fRQc90ikPQArRrlpxY4 mlGijT3Pa7eKiYhf2egzbQ4XXJmXkXnZiy3JlRBLVk6wREel8lW3BgvR/OyjKDnD 2nvX2hu2Ty6Gj+tfcRvAIBaEUItCLMdwPdwY0lCBpaT74sTjq3kc2fWnJdVXVZV3 qeAJtTFkbacKOqxIMV6WMIb4B0+EZ4q+W2HEm8anA5AaTaeGGSKMKhQGrSR7n0Qg An+BSSb2RmqvpirLdJerqVecdrdg/0KSKEAbcbJAbK/kgz/+mV2i29LdzfYGnkSP azLOs8RzPARR0kFbiQvwbDsGsdnQ5fE4ioU/SUz31ejM93d1Tr/Y1TTJ0tF9itnJ ZR896HYokfIHTX6jgpFIyvAtT9odqm8/lXRL+fjKKgaxa6qygzwoMVxmLKmYML9n QajcGWj4nPS2KnYn1aU/MiRwu+YBxeZhL4NIK5lNNWgYz5RMTxfPrTVvcO0FI8mA TkCYNijvUIWLRmg9LMcuSz/aOjqwSkUcngJq8f4N5Ksc4JS47x+6aveaIs8XRDcl kp0YcJh9r2HipC1zjBhq2FkdfIMvhpkrkEAttlP2E/k5mlzBwRk= =E/Bc -----END PGP SIGNATURE-----
