Monday, May 5, 2025

[USN-7484-1] OpenJDK 24 vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=Nzxr
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7484-1
May 06, 2025

openjdk-24 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.10

Summary:

Several security issues were fixed in OpenJDK 24.

Software Description:
- openjdk-24: Open Source Java implementation

Details:

Alicja Kario discovered that the JSSE component of OpenJDK 24 incorrectly
handled RSA padding. An Attacker could possibly use this issue to obtain
sensitive information. (CVE-2025-21587)

It was discovered that the Compiler component of OpenJDK 24 incorrectly
handled compiler transformations. An attacker could possibly use this
issue to cause a denial of service or execute arbitrary code.
(CVE-2025-30691)

It was discovered that the 2D component of OpenJDK 24 did not properly
manage memory under certain circumstances. An attacker could possibly use
this issue to cause a denial of service or execute arbitrary code.
(CVE-2025-30698)

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:
https://openjdk.org/groups/vulnerability/advisories/2025-04-15

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
  openjdk-24-jdk                  24.0.1+9~us1-0ubuntu1~25.04
  openjdk-24-jdk-headless         24.0.1+9~us1-0ubuntu1~25.04
  openjdk-24-jre                  24.0.1+9~us1-0ubuntu1~25.04
  openjdk-24-jre-headless         24.0.1+9~us1-0ubuntu1~25.04
  openjdk-24-jre-zero             24.0.1+9~us1-0ubuntu1~25.04
  openjdk-24-jvmci-jdk            24.0.1+9~us1-0ubuntu1~25.04

Ubuntu 24.10
  openjdk-24-jdk                  24.0.1+9~us1-0ubuntu1~24.10
  openjdk-24-jdk-headless         24.0.1+9~us1-0ubuntu1~24.10
  openjdk-24-jre                  24.0.1+9~us1-0ubuntu1~24.10
  openjdk-24-jre-headless         24.0.1+9~us1-0ubuntu1~24.10
  openjdk-24-jre-zero             24.0.1+9~us1-0ubuntu1~24.10
  openjdk-24-jvmci-jdk            24.0.1+9~us1-0ubuntu1~24.10

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart Java
applications to make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7484-1
  CVE-2025-21587, CVE-2025-30691, CVE-2025-30698

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-24/24.0.1+9~us1-0ubuntu1~25.04
https://launchpad.net/ubuntu/+source/openjdk-24/24.0.1+9~us1-0ubuntu1~24.10

No comments:

Post a Comment