|
|
Log in / Subscribe / Register

Ubuntu alert USN-7996-1 (openjdk-25-crac)

From:  noreply+usn-bot@canonical.com
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-7996-1] CRaC JDK 25 vulnerabilities
Date:  Tue, 03 Feb 2026 12:14:33 +0000
Message-ID:  <E1vnFIf-0007YU-0D@lists.ubuntu.com>

========================================================================== Ubuntu Security Notice USN-7996-1 February 02, 2026 openjdk-25-crac vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.10 Summary: Several security issues were fixed in CRaC JDK 25. Software Description: - openjdk-25-crac: Open Source Java implementation with Coordinated Restore at Checkpoints Details: It was discovered that the RMI component of CRaC JDK 25 would establish RMI TCP endpoint connections to a remote host without setting an endpoint identification algorithm. An unauthenticated remote attacker could possibly use this issue to steal sensitive information. (CVE-2026-21925) Mingijung discovered that the AWT and JavaFX componenets of CRaC JDK 25 could run programs if Desktop.browse() was supplied a filename as a URI. An unauthenticated remote attacker could possibly use this issue to execute arbitrary code. (CVE-2026-21932) Zhihui Chen discovered that the Networking component of CRaC JDK 25 was suceptible to a CRLF injection vulnerability via the HttpServer class. An unauthenticated remote attacker could possibly use this issue to modify files or leak sensitive information. (CVE-2026-21933) Ireneusz Pastusiak discovered that the Security component of CRaC JDK 25 failed to verify provided URIs point to a legitimate source when AIA is enabled. An unauthenticated remote attacker could possibly use this issue to redirect users to malicious hosts. (CVE-2026-21945) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2026-... Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.10 openjdk-25-crac-jdk 25.0.2+10-0ubuntu1~25.10 openjdk-25-crac-jdk-headless 25.0.2+10-0ubuntu1~25.10 openjdk-25-crac-jre 25.0.2+10-0ubuntu1~25.10 openjdk-25-crac-jre-headless 25.0.2+10-0ubuntu1~25.10 openjdk-25-crac-jre-zero 25.0.2+10-0ubuntu1~25.10 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart Java applications to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7996-1 CVE-2026-21925, CVE-2026-21932, CVE-2026-21933, CVE-2026-21945 Package Information: https://launchpad.net/ubuntu/+source/openjdk-25-crac/25.0...


Attachment: signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmmB5iEACgkQcpJm3tlz hgEcQxAAnFlInMhCHe80zu9YeuZdZCze9hK7rIbL30Rzc2f1rNt2RAXS1WFkG1cV 1kZxzwZsIXqNbBZiFI10V9N71lBdUxMJYgxGmIwgnqEWWMV//0s9g6SvqFz420iy yMXNTZ5SMsZhXqMUhVWfPkS+nz16jNOYZyzDsKP3KZPsV3+1tcIaQbSwE7Dgpx6Y VQyeuYCIpzhmF9syb7wCU+CZbrZlFvDtr9u1Fegd6C1sYP6KignQFITmxOtlzUow qjfa/g3wL6YPEApCenjjUwMibL/Gl5aMzuwbo+ium4vz9GmzDaBZPAnrjXkMD60l Brl9kApnAa0yGNK1155WPWWSKdXkVAAezJFu69zojvSFP5NInSqzM+FiI05kRJqd z8N6dsKJpQsefd8wzdl/CJi2jc0y4Bw9M1nS1PIYAiWlRXzW6HaKfkJtxWwbPtvk hHBq8LSkBQYd13hKWH28ge0dOTlM1q/winaScOszZIFOUsXmSflJQeEXH1jyre66 0G/ip45XTvgs6yMpcJYOmuUwZBHCwnSUcEvGxeeBxBz+kowFrkE/q2kNSrtBhRKm QIO/CCmTpY+FhMCvqJ3S7mGjFkpy2gOD6sW4c5MpUSzg3ONAcwVb84d94DmDVoJv 4zBo9hKBgKjK/PfsKRjwoIzCayY4qGCd7ZzET7yG76kFfW+yQV8= =7eEh -----END PGP SIGNATURE-----


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds