|
|
Log in / Subscribe / Register

Ubuntu alert USN-8000-1 (openjdk-8)

From:  noreply+usn-bot@canonical.com
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-8000-1] OpenJDK 8 vulnerabilities
Date:  Tue, 03 Feb 2026 03:34:21 +0000
Message-ID:  <E1vn7BF-0004Wl-5l@lists.ubuntu.com>

========================================================================== Ubuntu Security Notice USN-8000-1 February 02, 2026 openjdk-8 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in OpenJDK 8. Software Description: - openjdk-8: Open Source Java implementation Details: It was discovered that the RMI component of OpenJDK 8 would establish RMI TCP endpoint connections to a remote host without setting an endpoint identification algorithm. An unauthenticated remote attacker could possibly use this issue to steal sensitive information. (CVE-2026-21925) Mingijung discovered that the AWT and JavaFX componenets of OpenJDK 8 could run programs if Desktop.browse() was supplied a filename as a URI. An unauthenticated remote attacker could possibly use this issue to execute arbitrary code. (CVE-2026-21932) Zhihui Chen discovered that the Networking component of OpenJDK 8 was suceptible to a CRLF injection vulnerability via the HttpServer class. An unauthenticated remote attacker could possibly use this issue to modify files or leak sensitive information. (CVE-2026-21933) Ireneusz Pastusiak discovered that the Security component of OpenJDK 8 failed to verify provided URIs point to a legitimate source when AIA is enabled. An unauthenticated remote attacker could possibly use this issue to redirect users to malicious hosts. (CVE-2026-21945) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2026-... Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.10 openjdk-8-jdk 8u482-ga~us1-0ubuntu1~25.10 openjdk-8-jdk-headless 8u482-ga~us1-0ubuntu1~25.10 openjdk-8-jre 8u482-ga~us1-0ubuntu1~25.10 openjdk-8-jre-headless 8u482-ga~us1-0ubuntu1~25.10 openjdk-8-jre-zero 8u482-ga~us1-0ubuntu1~25.10 Ubuntu 24.04 LTS openjdk-8-jdk 8u482-ga~us1-0ubuntu1~24.04 openjdk-8-jdk-headless 8u482-ga~us1-0ubuntu1~24.04 openjdk-8-jre 8u482-ga~us1-0ubuntu1~24.04 openjdk-8-jre-headless 8u482-ga~us1-0ubuntu1~24.04 openjdk-8-jre-zero 8u482-ga~us1-0ubuntu1~24.04 Ubuntu 22.04 LTS openjdk-8-jdk 8u482-ga~us1-0ubuntu1~22.04 openjdk-8-jdk-headless 8u482-ga~us1-0ubuntu1~22.04 openjdk-8-jre 8u482-ga~us1-0ubuntu1~22.04 openjdk-8-jre-headless 8u482-ga~us1-0ubuntu1~22.04 openjdk-8-jre-zero 8u482-ga~us1-0ubuntu1~22.04 Ubuntu 20.04 LTS openjdk-8-jdk 8u482-ga~us1-0ubuntu1~20.04 Available with Ubuntu Pro openjdk-8-jdk-headless 8u482-ga~us1-0ubuntu1~20.04 Available with Ubuntu Pro openjdk-8-jre 8u482-ga~us1-0ubuntu1~20.04 Available with Ubuntu Pro openjdk-8-jre-headless 8u482-ga~us1-0ubuntu1~20.04 Available with Ubuntu Pro openjdk-8-jre-zero 8u482-ga~us1-0ubuntu1~20.04 Available with Ubuntu Pro Ubuntu 18.04 LTS openjdk-8-jdk 8u482-ga~us1-0ubuntu1~18.04 Available with Ubuntu Pro openjdk-8-jdk-headless 8u482-ga~us1-0ubuntu1~18.04 Available with Ubuntu Pro openjdk-8-jre 8u482-ga~us1-0ubuntu1~18.04 Available with Ubuntu Pro openjdk-8-jre-headless 8u482-ga~us1-0ubuntu1~18.04 Available with Ubuntu Pro openjdk-8-jre-zero 8u482-ga~us1-0ubuntu1~18.04 Available with Ubuntu Pro Ubuntu 16.04 LTS openjdk-8-jdk 8u482-ga~us1-0ubuntu1~16.04 Available with Ubuntu Pro openjdk-8-jdk-headless 8u482-ga~us1-0ubuntu1~16.04 Available with Ubuntu Pro openjdk-8-jre 8u482-ga~us1-0ubuntu1~16.04 Available with Ubuntu Pro openjdk-8-jre-headless 8u482-ga~us1-0ubuntu1~16.04 Available with Ubuntu Pro openjdk-8-jre-jamvm 8u482-ga~us1-0ubuntu1~16.04 Available with Ubuntu Pro openjdk-8-jre-zero 8u482-ga~us1-0ubuntu1~16.04 Available with Ubuntu Pro This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart Java applications to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-8000-1 CVE-2026-21925, CVE-2026-21932, CVE-2026-21933, CVE-2026-21945 Package Information: https://launchpad.net/ubuntu/+source/openjdk-8/8u482-ga~u... https://launchpad.net/ubuntu/+source/openjdk-8/8u482-ga~u... https://launchpad.net/ubuntu/+source/openjdk-8/8u482-ga~u...


Attachment: signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmmBa8UACgkQcpJm3tlz hgHUZA//QQ8/Jx0Y8HXQbpJGYRXr9tiZiyUxzS7iThIpP3cJRYp2oSdw6e/boGyU 6sO7awWs9fEycg3Tx6yzShEHkGRH9GwNMYi8uxEnu4atYOYY+SwDFP3anRhY0A4c Fzl4PNIBBWMJnWEwPZX1bMApgpoGGjVcBz5QR2fSs9iaIS8CJzybetiIdF01FJO9 IUCPVtR4sfbpfxdwRyAsEsAVVyGGqieFZ2yainJPbKcpQAou65vjPzDQgzTW6LiL WgfUS7jrb7GcIt3mXqdyjKzzIeRB4TssRA8rdzCU8dO5inFk0cHGa2CtUuXdi5ti yuyKMjni70omeXaPXKBSePjPsriWuAt5jIRLu29Rs+UYTjrXM5ARnRDBU3vktcZ9 ye4JkIOsdGY7jX1FWpo4N6hnGhywN+tSATtXzuD88DeGQ8FlQ7lREQRCBNen/S0q /2Mgbb1xgiiaMMeICFTil2EAxLMqujHuHpUGWxbvtqCqaCSvcdhypcGsizaATUEy NhWzXQKFIdE6K/xnrPiBD4BPz7r1eppsooKcyF3gTyB+Zc99PfgzlTlW6EVxZYl/ HJBZUlDEIQIhop1fi8ruIUO+BwsIvnWEAjpY/uUs9nXKXL4/6a6oPOjlezYQ0oFl QQAu2NTJstNYPkFyrHU7Vg9+POsyd/D32ojPCatmcdsjKEdxxKA= =Lbg1 -----END PGP SIGNATURE-----


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds