Login
Newsletter
Werbung

Sicherheit: Preisgabe von Informationen in OpenJDK
Aktuelle Meldungen Distributionen
Name: Preisgabe von Informationen in OpenJDK
ID: USN-7254-1
Distribution: Ubuntu
Plattformen: Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10
Datum: Mi, 5. Februar 2025, 23:10
Referenzen: https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~22.04.1
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~20.04.1
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~24.04.1
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~24.10.1
https://www.cve.org/CVERecord?id=CVE-2025-21502
Applikationen: OpenJDK

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============2080731002782443465==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------0dc0OqsCE556b8BFhfvtln5O"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------0dc0OqsCE556b8BFhfvtln5O
Content-Type: multipart/mixed;
boundary="------------5SMsdG5xtNYJpn6wcrQ1QUr3";
protected-headers="v1"
From: Evan Caville <evan.caville@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <2fa718f2-d52a-4c0f-a906-48857d837bd4@canonical.com>
Subject: [USN-7254-1] OpenJDK 21 vulnerability

--------------5SMsdG5xtNYJpn6wcrQ1QUr3
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7254-1
February 05, 2025

openjdk-21 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

OpenJDK 21 could be made to expose sensitive information over the
network.

Software Description:
- openjdk-21: Open Source Java implementation

Details:

It was discovered that the Hotspot component of OpenJDK 21 did not properly
handle API access under certain circumstances. An unauthenticated attacker
could possibly use this issue to access unauthorized resources and expose
sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
  openjdk-21-jdk                  21.0.6+7-1~24.10.1
  openjdk-21-jdk-headless         21.0.6+7-1~24.10.1
  openjdk-21-jre                  21.0.6+7-1~24.10.1
  openjdk-21-jre-headless         21.0.6+7-1~24.10.1
  openjdk-21-jre-zero             21.0.6+7-1~24.10.1

Ubuntu 24.04 LTS
  openjdk-21-jdk                  21.0.6+7-1~24.04.1
  openjdk-21-jdk-headless         21.0.6+7-1~24.04.1
  openjdk-21-jre                  21.0.6+7-1~24.04.1
  openjdk-21-jre-headless         21.0.6+7-1~24.04.1
  openjdk-21-jre-zero             21.0.6+7-1~24.04.1

Ubuntu 22.04 LTS
  openjdk-21-jdk                  21.0.6+7-1~22.04.1
  openjdk-21-jdk-headless         21.0.6+7-1~22.04.1
  openjdk-21-jre                  21.0.6+7-1~22.04.1
  openjdk-21-jre-headless         21.0.6+7-1~22.04.1
  openjdk-21-jre-zero             21.0.6+7-1~22.04.1

Ubuntu 20.04 LTS
  openjdk-21-jdk                  21.0.6+7-1~20.04.1
  openjdk-21-jdk-headless         21.0.6+7-1~20.04.1
  openjdk-21-jre                  21.0.6+7-1~20.04.1
  openjdk-21-jre-headless         21.0.6+7-1~20.04.1
  openjdk-21-jre-zero             21.0.6+7-1~20.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart Java
applications to make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7254-1
  CVE-2025-21502

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~24.10.1
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~24.04.1
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~22.04.1
https://launchpad.net/ubuntu/+source/openjdk-21/21.0.6+7-1~20.04.1

--------------5SMsdG5xtNYJpn6wcrQ1QUr3--

--------------0dc0OqsCE556b8BFhfvtln5O
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----
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=UTXf
-----END PGP SIGNATURE-----

--------------0dc0OqsCE556b8BFhfvtln5O--


--===============2080731002782443465==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============2080731002782443465==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung