Ubuntu alert USN-7995-1 (openjdk-25)
| From: | noreply+usn-bot@canonical.com | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-7995-1] OpenJDK 25 vulnerabilities | |
| Date: | Tue, 03 Feb 2026 12:14:29 +0000 | |
| Message-ID: | <E1vnFIb-0007Xj-Ji@lists.ubuntu.com> |
========================================================================== Ubuntu Security Notice USN-7995-1 February 02, 2026 openjdk-25 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS Summary: Several security issues were fixed in OpenJDK 25. Software Description: - openjdk-25: Open Source Java implementation Details: It was discovered that the RMI component of OpenJDK 25 would establish RMI TCP endpoint connections to a remote host without setting an endpoint identification algorithm. An unauthenticated remote attacker could possibly use this issue to steal sensitive information. (CVE-2026-21925) Mingijung discovered that the AWT and JavaFX componenets of OpenJDK 25 could run programs if Desktop.browse() was supplied a filename as a URI. An unauthenticated remote attacker could possibly use this issue to execute arbitrary code. (CVE-2026-21932) Zhihui Chen discovered that the Networking component of OpenJDK 25 was suceptible to a CRLF injection vulnerability via the HttpServer class. An unauthenticated remote attacker could possibly use this issue to modify files or leak sensitive information. (CVE-2026-21933) Ireneusz Pastusiak discovered that the Security component of OpenJDK 25 failed to verify provided URIs point to a legitimate source when AIA is enabled. An unauthenticated remote attacker could possibly use this issue to redirect users to malicious hosts. (CVE-2026-21945) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2026-... Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.10 openjdk-25-jdk 25.0.2+10-1~25.10 openjdk-25-jdk-headless 25.0.2+10-1~25.10 openjdk-25-jre 25.0.2+10-1~25.10 openjdk-25-jre-headless 25.0.2+10-1~25.10 openjdk-25-jre-zero 25.0.2+10-1~25.10 openjdk-25-jvmci-jdk 25.0.2+10-1~25.10 Ubuntu 24.04 LTS openjdk-25-jdk 25.0.2+10-1~24.04 openjdk-25-jdk-headless 25.0.2+10-1~24.04 openjdk-25-jre 25.0.2+10-1~24.04 openjdk-25-jre-headless 25.0.2+10-1~24.04 openjdk-25-jre-zero 25.0.2+10-1~24.04 openjdk-25-jvmci-jdk 25.0.2+10-1~24.04 Ubuntu 22.04 LTS openjdk-25-jdk 25.0.2+10-1~22.04 openjdk-25-jdk-headless 25.0.2+10-1~22.04 openjdk-25-jre 25.0.2+10-1~22.04 openjdk-25-jre-headless 25.0.2+10-1~22.04 openjdk-25-jre-zero 25.0.2+10-1~22.04 openjdk-25-jvmci-jdk 25.0.2+10-1~22.04 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart Java applications to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7995-1 CVE-2026-21925, CVE-2026-21932, CVE-2026-21933, CVE-2026-21945 Package Information: https://launchpad.net/ubuntu/+source/openjdk-25/25.0.2+10... https://launchpad.net/ubuntu/+source/openjdk-25/25.0.2+10... https://launchpad.net/ubuntu/+source/openjdk-25/25.0.2+10...
Attachment: signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmmB5hwACgkQcpJm3tlz hgHRAQ/8C/8htlTIdNFRyWdRWY6gHkJB4SSS91vJ4mDxtL0y2xGPSHRIfEYc8zNO HYc81XeP2uQyIEUlnA7IEv5cUCtQiaHE5flvE8AXdEpBIGfh0p8FmoRIlrSc/48G yESbg5zOku/uGiLTo+cEUCKw8Ht5B55qPObg94pt07k4Z+yVrYscVFrrMfD9iM/y lm/hGcbC2gw7w3dwJInkhvAe/SiNdby/HJasalyAq/McKEsW4Fj7zCagrlD70O6H Tuy9IqAE0dWl2ISMuGrKGB4/OXxY9xwQyExIGrM4gbsR4nZ9cG3AnzEh+pl9ngLr M4QyW+CFxg5dX+qHnRQk9HcH23/cg8x+VMUCpG1mQFAAmSbI0XOUUIe7fZgWmCzZ yLjH46lCfvStJe0v4/MWMfSp69J6CY9MLKjzp//e9IQbxv3rZmFONG3NqA8LtxMC CSbUkMLHAfDiIG6mkLgwesEBY46bg+iq9dFajGXSsfFkM+eP9Mq658j8DnnyDepr wlnfxpBE3+c9yf5fLM3+zENc9EBswmiyy4ANo1+F7/K6brMBNM/pggNw1wNGF7Sh /iXJv0kLMdEc0sbs2MlXerfkJkBOdu7m+oQJ6lI9Xai93Fdyux2IGlcgjviJIbfc dawgrN1maIoG30zOcQQmQxyRA/WUQwbuDb7lTKjV6fo8RjVgqUc= =58e8 -----END PGP SIGNATURE-----
