|
|
Log in / Subscribe / Register

Ubuntu alert USN-8003-1 (openjdk-21-crac)

From:  noreply+usn-bot@canonical.com
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-8003-1] CRaC JDK 21 vulnerabilities
Date:  Tue, 03 Feb 2026 03:34:25 +0000
Message-ID:  <E1vn7BJ-0004eB-JA@lists.ubuntu.com>

========================================================================== Ubuntu Security Notice USN-8003-1 February 02, 2026 openjdk-21-crac vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.10 Summary: Several security issues were fixed in CRaC JDK 21. Software Description: - openjdk-21-crac: Open Source Java implementation with Coordinated Restore at Checkpoints Details: It was discovered that the RMI component of CRaC JDK 21 would establish RMI TCP endpoint connections to a remote host without setting an endpoint identification algorithm. An unauthenticated remote attacker could possibly use this issue to steal sensitive information. (CVE-2026-21925) Mingijung discovered that the AWT and JavaFX componenets of CRaC JDK 21 could run programs if Desktop.browse() was supplied a filename as a URI. An unauthenticated remote attacker could possibly use this issue to execute arbitrary code. (CVE-2026-21932) Zhihui Chen discovered that the Networking component of CRaC JDK 21 was suceptible to a CRLF injection vulnerability via the HttpServer class. An unauthenticated remote attacker could possibly use this issue to modify files or leak sensitive information. (CVE-2026-21933) Ireneusz Pastusiak discovered that the Security component of CRaC JDK 21 failed to verify provided URIs point to a legitimate source when AIA is enabled. An unauthenticated remote attacker could possibly use this issue to redirect users to malicious hosts. (CVE-2026-21945) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2026-... Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.10 openjdk-21-crac-demo 21.0.10+7-0ubuntu1~25.10 openjdk-21-crac-doc 21.0.10+7-0ubuntu1~25.10 openjdk-21-crac-jdk 21.0.10+7-0ubuntu1~25.10 openjdk-21-crac-jdk-headless 21.0.10+7-0ubuntu1~25.10 openjdk-21-crac-jre 21.0.10+7-0ubuntu1~25.10 openjdk-21-crac-jre-headless 21.0.10+7-0ubuntu1~25.10 openjdk-21-crac-jre-zero 21.0.10+7-0ubuntu1~25.10 openjdk-21-crac-source 21.0.10+7-0ubuntu1~25.10 openjdk-21-crac-testsupport 21.0.10+7-0ubuntu1~25.10 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart Java applications to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-8003-1 CVE-2026-21925, CVE-2026-21932, CVE-2026-21933, CVE-2026-21945 Package Information: https://launchpad.net/ubuntu/+source/openjdk-21-crac/21.0...


Attachment: signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmmBbIMACgkQcpJm3tlz hgEsTxAAxyL9wRcCxsD+0a/S5xoh9MMzUu5YzPXYnwVqZdRtZz7tQ3ASRcMFFvc1 YLo34hHZVQg4093YUkiW2/VGMSJpUpiLed5lGSDlkwxPh/4KVrcS06yY1WbmoKJ0 co7GCQKlHwsRSmc2+buJ5GCJmc0LLtqxd2FzyBTSHHQ1sPZMPQ8EI5/CmWqbI5aG 2vpGL7HVrky+z+NOVQr2xoMUtgunrKLBZxhSBVCZq97SPZhtUlBOqonJYHKVkHMx NIo1UnxW7J//JIL3KXM5r593O47uK4TiDYPrrDou6uRQ5aXbrJdtHRKRQdd3RPqp nKCLpnADhNHthMhBVIzSOD1q/X6rnmMQZJMoxhZIPIJ0MkxuwM473y2rAKAdkweW pcD7egZN4RWI0+0wz19rK1JsI0gx9MiEWh4N44h3YBZ3q3P2cn8g+b49klR1UKp5 2NSCXdgQTv0hep/e4AtO/la2w0KQt1lcfze5afjgERiLh8bbEEmvtMg6IPKVUOZ1 zIodwTT/PTd8mlP2Gaf62lGRJr9L7A6FSIQIxbMEW2HnGSpuYqS5YANzU3ocSzI0 UHsX5dqIIHO645p6eIxRHtBx6mA9AycA0Kr+0Unv7pq9jITAciyLP6r4Zyn1nipn VUYK1k/iCRnWNc4DgPU3KsfaFjOt65uZebHstAoyuynb86ulq8w= =OGU8 -----END PGP SIGNATURE-----


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds