drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Preisgabe von Informationen in OpenJDK
| Name: |
Preisgabe von Informationen in OpenJDK |
|
| ID: |
USN-7254-1 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10 |
|
| Datum: |
Mi, 5. Februar 2025, 23:10 |
|
| Referenzen: |
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~22.04.1
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~20.04.1
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~24.04.1
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~24.10.1
https://www.cve.org/CVERecord?id=CVE-2025-21502 |
|
| Applikationen: |
OpenJDK |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============2080731002782443465== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------0dc0OqsCE556b8BFhfvtln5O"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------0dc0OqsCE556b8BFhfvtln5O Content-Type: multipart/mixed; boundary="------------5SMsdG5xtNYJpn6wcrQ1QUr3"; protected-headers="v1" From: Evan Caville <evan.caville@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <2fa718f2-d52a-4c0f-a906-48857d837bd4@canonical.com> Subject: [USN-7254-1] OpenJDK 21 vulnerability
--------------5SMsdG5xtNYJpn6wcrQ1QUr3 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7254-1 February 05, 2025
openjdk-21 vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS
Summary:
OpenJDK 21 could be made to expose sensitive information over the network.
Software Description: - openjdk-21: Open Source Java implementation
Details:
It was discovered that the Hotspot component of OpenJDK 21 did not properly handle API access under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.10 openjdk-21-jdk 21.0.6+7-1~24.10.1 openjdk-21-jdk-headless 21.0.6+7-1~24.10.1 openjdk-21-jre 21.0.6+7-1~24.10.1 openjdk-21-jre-headless 21.0.6+7-1~24.10.1 openjdk-21-jre-zero 21.0.6+7-1~24.10.1
Ubuntu 24.04 LTS openjdk-21-jdk 21.0.6+7-1~24.04.1 openjdk-21-jdk-headless 21.0.6+7-1~24.04.1 openjdk-21-jre 21.0.6+7-1~24.04.1 openjdk-21-jre-headless 21.0.6+7-1~24.04.1 openjdk-21-jre-zero 21.0.6+7-1~24.04.1
Ubuntu 22.04 LTS openjdk-21-jdk 21.0.6+7-1~22.04.1 openjdk-21-jdk-headless 21.0.6+7-1~22.04.1 openjdk-21-jre 21.0.6+7-1~22.04.1 openjdk-21-jre-headless 21.0.6+7-1~22.04.1 openjdk-21-jre-zero 21.0.6+7-1~22.04.1
Ubuntu 20.04 LTS openjdk-21-jdk 21.0.6+7-1~20.04.1 openjdk-21-jdk-headless 21.0.6+7-1~20.04.1 openjdk-21-jre 21.0.6+7-1~20.04.1 openjdk-21-jre-headless 21.0.6+7-1~20.04.1 openjdk-21-jre-zero 21.0.6+7-1~20.04.1
This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart Java applications to make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7254-1 CVE-2025-21502
Package Information: https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~24.10.1 https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~24.04.1 https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~22.04.1 https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~20.04.1
--------------5SMsdG5xtNYJpn6wcrQ1QUr3--
--------------0dc0OqsCE556b8BFhfvtln5O Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEEAPYWTpwtIbr7xH4OWNrRIKaTkWcFAmejB2kFAwAAAAAACgkQWNrRIKaTkWdC NBAAunzlRxl7gu0jQ8J/CzVSJM5pXDq/evW2JYiwQxtCqEuwXIa8h5OHDUVxe3k0Eafy/dK0qhv9 mFmO+/npxRvc7kO1Bslj0OFcU0V67Q4gJ6jtub39rLkBSn+U9c44Tcj1+JDerbyZ2jY+iZoxEvim S1tzlKSm7i9KyZkYpZPZrWT5yWx0zgSFUXo748oS2ogAAv8XSYjZDNywvjU3MdPTTpUfeOwMkU3a IbGD3bYHkwGJmSfHv+2OqIeQOyvddyNrEGJ8JUD1ekGXeiqF/ug+5lm5WE4rSetLHhxGOdKqyZ22 YN2LMizZInBz3PSKXC5UH1qmJ/7w3wGKdZ2wOC/chK8aezvGoST7lF2kwIKzJtdOw6tZ2IrnysnE eDWLwlTo46la3wzyWTqiopC+V0dD2aYnjlBcSYM6VxlbB93BDWtC1X6SnGH8bQzdCxcI0eln2o0q vFfUThABQfgw7c8ID+WtKeq9qnFbSL0RNonncSVUfVDI5Ago4EKdok1gT37akjgq9dDWV4YnLsiy bSoqdMV6vJvHhFfzxl7fy3UwXw8vBXCuNJOliP+nJoqqXPfE58lYUpUDAr7Rbms/vUykLDAG8Zas HWfRBmmqV2iokIPNe3KLmIk9j3OyMzGMt2HJ/PT0kGSi/+zLfvgNTe/NOxFgnRpLDv+rIAASuN52 Z6U= =UTXf -----END PGP SIGNATURE-----
--------------0dc0OqsCE556b8BFhfvtln5O--
--===============2080731002782443465== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============2080731002782443465==--
|
|
|
|