drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in OpenJDK
| Name: |
Mehrere Probleme in OpenJDK |
|
| ID: |
USN-7484-1 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 24.10, Ubuntu 25.04 |
|
| Datum: |
Di, 6. Mai 2025, 07:23 |
|
| Referenzen: |
https://openjdk.org/groups/vulnerability/advisories/2025-04-15
https://launchpad.net/ubuntu/+source/openjdk-24/24.0.1+9~us1-0ubuntu1~24.10
https://www.cve.org/CVERecord?id=CVE-2025-30698
https://launchpad.net/ubuntu/+source/openjdk-24/24.0.1+9~us1-0ubuntu1~25.04
https://www.cve.org/CVERecord?id=CVE-2025-21587
https://www.cve.org/CVERecord?id=CVE-2025-30691 |
|
| Applikationen: |
OpenJDK |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============2086948393179566446== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------pBbwZBtwpj30ZbEO7M2yQj5U"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------pBbwZBtwpj30ZbEO7M2yQj5U Content-Type: multipart/mixed; boundary="------------0BKu6j49L7idU0tKvQ606ast"; protected-headers="v1" From: Evan Caville <evan.caville@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <11a8f349-5ad2-462e-a6ae-287f17b4ed22@canonical.com> Subject: [USN-7484-1] OpenJDK 24 vulnerabilities
--------------0BKu6j49L7idU0tKvQ606ast Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7484-1 May 06, 2025
openjdk-24 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.04 - Ubuntu 24.10
Summary:
Several security issues were fixed in OpenJDK 24.
Software Description: - openjdk-24: Open Source Java implementation
Details:
Alicja Kario discovered that the JSSE component of OpenJDK 24 incorrectly handled RSA padding. An Attacker could possibly use this issue to obtain sensitive information. (CVE-2025-21587)
It was discovered that the Compiler component of OpenJDK 24 incorrectly handled compiler transformations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30691)
It was discovered that the 2D component of OpenJDK 24 did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30698)
In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.
Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2025-04-15
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 25.04 openjdk-24-jdk 24.0.1+9~us1-0ubuntu1~25.04 openjdk-24-jdk-headless 24.0.1+9~us1-0ubuntu1~25.04 openjdk-24-jre 24.0.1+9~us1-0ubuntu1~25.04 openjdk-24-jre-headless 24.0.1+9~us1-0ubuntu1~25.04 openjdk-24-jre-zero 24.0.1+9~us1-0ubuntu1~25.04 openjdk-24-jvmci-jdk 24.0.1+9~us1-0ubuntu1~25.04
Ubuntu 24.10 openjdk-24-jdk 24.0.1+9~us1-0ubuntu1~24.10 openjdk-24-jdk-headless 24.0.1+9~us1-0ubuntu1~24.10 openjdk-24-jre 24.0.1+9~us1-0ubuntu1~24.10 openjdk-24-jre-headless 24.0.1+9~us1-0ubuntu1~24.10 openjdk-24-jre-zero 24.0.1+9~us1-0ubuntu1~24.10 openjdk-24-jvmci-jdk 24.0.1+9~us1-0ubuntu1~24.10
This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart Java applications to make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7484-1 CVE-2025-21587, CVE-2025-30691, CVE-2025-30698
Package Information: https://launchpad.net/ubuntu/+source/openjdk-24/24.0.1+9~us1-0ubuntu1~25.04 https://launchpad.net/ubuntu/+source/openjdk-24/24.0.1+9~us1-0ubuntu1~24.10
--------------0BKu6j49L7idU0tKvQ606ast--
--------------pBbwZBtwpj30ZbEO7M2yQj5U Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEEAPYWTpwtIbr7xH4OWNrRIKaTkWcFAmgZj1oFAwAAAAAACgkQWNrRIKaTkWf1 ixAAy65kGodQ2wD8qZJslo3VRpN5dHVa9YocP7vz/DVh8Q4I1WNv9BOZq4Bx5bR4hD9MEKeRJmWl kDwFc/wHP7CsXRRW8MBHu1qaV6+bGI/1m6eZnHCGyRM0lbxfoRtxzHDX1XuNzNsZJot5gJaKA9H6 4sTC+jTKKCAT4oIw21FhnpzLtFQDbNrKirFz3sLcBhQeDfIk3FSTu9w43h5/QTz8jbjE6KPKNBCw kV3cBm3gzNdCcw8Ds2XTgN6PU+FHrXgEgvqhMgEAkc3euqclJklo050wIWornEVTgQSs6LB2sRL3 SRVGebvlGLJ8rFZK04VCg19zmdv8yJdg0Rp32j/ZweWDUXeAorsThR7QwevXTX3O+PP1opkswIGM 62rXrtifI5brO14pP9NLt8xWQ5XP+YwNJD2IsD5QUc2ben/LagMju74ZZPxlE3jPYFMVAlVEV6Bn IKJCwQ/ug5iYwKs5Li/cu3eHsRJ8BcBSJzcNql2QDcwR1MuubhU7xeVjB4KcUVoYaGzz5eNJuKf3 jXfeEnSvCZWWtvsAEaTwqLW8UE2blwNu8N9wExXbDJtDhXdLqEfD+UzXLT5eQ4oLtnSj3B7Ox6VD H1hm/HoYL+pRbB9LD1dFQNGuCeOZCaWPr4Ws44oFUEBeiyFO+Ja1GryAgNxSHnCW/gFkRLyQVkyN eXU= =Nzxr -----END PGP SIGNATURE-----
--------------pBbwZBtwpj30ZbEO7M2yQj5U--
--===============2086948393179566446== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============2086948393179566446==--
|
|
|
|