|
|
Log in / Subscribe / Register

Ubuntu alert USN-7997-1 (openjdk-17-crac)

From:  noreply+usn-bot@canonical.com
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-7997-1] CRaC JDK 17 vulnerabilities
Date:  Tue, 03 Feb 2026 12:14:35 +0000
Message-ID:  <E1vnFIh-0007Z7-Kc@lists.ubuntu.com>

========================================================================== Ubuntu Security Notice USN-7997-1 February 02, 2026 openjdk-17-crac vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.10 Summary: Several security issues were fixed in CRaC JDK 17. Software Description: - openjdk-17-crac: Open Source Java implementation with Coordinated Restore at Checkpoints Details: It was discovered that the RMI component of CRaC JDK 17 would establish RMI TCP endpoint connections to a remote host without setting an endpoint identification algorithm. An unauthenticated remote attacker could possibly use this issue to steal sensitive information. (CVE-2026-21925) Mingijung discovered that the AWT and JavaFX componenets of CRaC JDK 17 could run programs if Desktop.browse() was supplied a filename as a URI. An unauthenticated remote attacker could possibly use this issue to execute arbitrary code. (CVE-2026-21932) Zhihui Chen discovered that the Networking component of CRaC JDK 17 was suceptible to a CRLF injection vulnerability via the HttpServer class. An unauthenticated remote attacker could possibly use this issue to modify files or leak sensitive information. (CVE-2026-21933) Ireneusz Pastusiak discovered that the Security component of CRaC JDK 17 failed to verify provided URIs point to a legitimate source when AIA is enabled. An unauthenticated remote attacker could possibly use this issue to redirect users to malicious hosts. (CVE-2026-21945) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2026-... Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.10 openjdk-17-crac-jdk 17.0.18+8-0ubuntu1~25.10 openjdk-17-crac-jdk-headless 17.0.18+8-0ubuntu1~25.10 openjdk-17-crac-jre 17.0.18+8-0ubuntu1~25.10 openjdk-17-crac-jre-headless 17.0.18+8-0ubuntu1~25.10 openjdk-17-crac-jre-zero 17.0.18+8-0ubuntu1~25.10 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart Java applications to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7997-1 CVE-2026-21925, CVE-2026-21932, CVE-2026-21933, CVE-2026-21945 Package Information: https://launchpad.net/ubuntu/+source/openjdk-17-crac/17.0...


Attachment: signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmmB5jAACgkQcpJm3tlz hgGD9Q/+Lm70Gqe0bH9JdaoVMBYwX+f+qUfSgLTx7MzlTKDijMoTXmTA0QEprzEm xF5tmty/jqP2vGWi8yvmGMm0tQv/U37kfWnsBBy/1MSr8E+moC40wohy11o9CotT xcDXaVHSQs/Q3caFHedAgb64SOj5sExzSgdwS2AxrUvdToEXuPOcpMOPIjBq61PJ NEcwMl43hyut42SXFGKJtZTHXlm+p+sjoRSRmL134zCSBiAosxXFiFIMptXrTs5h OOLD3IMqs70qsphW120gW2+a6CEcymUR3Ght6BwrjNT9qUWZNKXO701w17O+E+ZV sODWhMz1q4r7qrqZSB4WGrjjIHSoG8vvF2UpmEXszcjBFuDTAosCLvSgUxBZTkec gXAI6GaMpmmjJB6eUXI+XuNlP7ESPf9FxJhMWsWTFseX4HyCYAq2vScm8qULt/1v DIKivY98DbM/49Gdr244oblF1JAsKW5us6vlaQx4VMHiTpq/XrZBtlW32fHMKshF FuP+dsFFWx0Ul8pm8iaPYvLg2TcmLDw3dUHFYyVHBKU7UxK0qY7qHGrLYpUaVpGo klzTiJliR++SLrkSgGQN3DcKNbKG942AA2V93nEsxfdrLvHatQzYCdpG5huIl9z8 yORRpFhH/t7qelGD/zJ3jsWcO8uBPLLb7puHFy2UD8MO8VP8PDw= =sXwn -----END PGP SIGNATURE-----


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds