-----BEGIN PGP SIGNATURE-----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=gItC
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7253-1
February 05, 2025
openjdk-17 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
OpenJDK 17 could be made to expose sensitive information over the
network.
Software Description:
- openjdk-17: Open Source Java implementation
Details:
It was discovered that the Hotspot component of OpenJDK 17 did not properly
handle API access under certain circumstances. An unauthenticated attacker
could possibly use this issue to access unauthorized resources and expose
sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.10
openjdk-17-jdk 17.0.14+7-1~24.10
openjdk-17-jdk-headless 17.0.14+7-1~24.10
openjdk-17-jre 17.0.14+7-1~24.10
openjdk-17-jre-headless 17.0.14+7-1~24.10
openjdk-17-jre-zero 17.0.14+7-1~24.10
Ubuntu 24.04 LTS
openjdk-17-jdk 17.0.14+7-1~24.04
openjdk-17-jdk-headless 17.0.14+7-1~24.04
openjdk-17-jre 17.0.14+7-1~24.04
openjdk-17-jre-headless 17.0.14+7-1~24.04
openjdk-17-jre-zero 17.0.14+7-1~24.04
Ubuntu 22.04 LTS
openjdk-17-jdk 17.0.14+7-1~22.04.1
openjdk-17-jdk-headless 17.0.14+7-1~22.04.1
openjdk-17-jre 17.0.14+7-1~22.04.1
openjdk-17-jre-headless 17.0.14+7-1~22.04.1
openjdk-17-jre-zero 17.0.14+7-1~22.04.1
Ubuntu 20.04 LTS
openjdk-17-jdk 17.0.14+7-1~20.04
openjdk-17-jdk-headless 17.0.14+7-1~20.04
openjdk-17-jre 17.0.14+7-1~20.04
openjdk-17-jre-headless 17.0.14+7-1~20.04
openjdk-17-jre-zero 17.0.14+7-1~20.04
Ubuntu 18.04 LTS
openjdk-17-jdk 17.0.14+7-1~18.04
Available with Ubuntu Pro
openjdk-17-jdk-headless 17.0.14+7-1~18.04
Available with Ubuntu Pro
openjdk-17-jre 17.0.14+7-1~18.04
Available with Ubuntu Pro
openjdk-17-jre-headless 17.0.14+7-1~18.04
Available with Ubuntu Pro
openjdk-17-jre-zero 17.0.14+7-1~18.04
Available with Ubuntu Pro
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart Java
applications to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7253-1
CVE-2025-21502
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.14+7-1~24.10
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.14+7-1~24.04
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.14+7-1~22.04.1
https://launchpad.net/ubuntu/+source/openjdk-17/17.0.14+7-1~20.04
No comments:
Post a Comment