{"id":"USN-7484-1","summary":"openjdk-24 vulnerabilities","details":"Alicja Kario discovered that the JSSE component of OpenJDK 24 incorrectly\nhandled RSA padding. An Attacker could possibly use this issue to obtain\nsensitive information. (CVE-2025-21587)\n\nIt was discovered that the Compiler component of OpenJDK 24 incorrectly\nhandled compiler transformations. An attacker could possibly use this\nissue to cause a denial of service or execute arbitrary code.\n(CVE-2025-30691)\n\nIt was discovered that the 2D component of OpenJDK 24 did not properly\nmanage memory under certain circumstances. An attacker could possibly use\nthis issue to cause a denial of service or execute arbitrary code.\n(CVE-2025-30698)\n\nIn addition to security fixes, the updated packages contain bug fixes, new\nfeatures, and possibly incompatible changes.\n\nPlease see the following for more information:\nhttps://openjdk.org/groups/vulnerability/advisories/2025-04-15\n","modified":"2026-01-30T01:39:28.773142Z","published":"2025-05-06T03:17:25.598054Z","related":["UBUNTU-CVE-2025-21587","UBUNTU-CVE-2025-30691","UBUNTU-CVE-2025-30698"],"upstream":["CVE-2025-21587","CVE-2025-30691","CVE-2025-30698","UBUNTU-CVE-2025-21587","UBUNTU-CVE-2025-30691","UBUNTU-CVE-2025-30698"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7484-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21587"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-30691"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-30698"}],"affected":[{"package":{"name":"openjdk-24","ecosystem":"Ubuntu:25.04","purl":"pkg:deb/ubuntu/openjdk-24@24.0.1+9~us1-0ubuntu1~25.04?arch=source&distro=plucky"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"24.0.1+9~us1-0ubuntu1~25.04"}]}],"versions":["24~16ea-1","24~20ea-1","24~22ea-1","24~30ea-1","24~33ea-1","24~34ea-0ubuntu1","24~36ea-1","24+36-1"],"ecosystem_specific":{"binaries":[{"binary_version":"24.0.1+9~us1-0ubuntu1~25.04","binary_name":"openjdk-24-demo"},{"binary_version":"24.0.1+9~us1-0ubuntu1~25.04","binary_name":"openjdk-24-jdk"},{"binary_version":"24.0.1+9~us1-0ubuntu1~25.04","binary_name":"openjdk-24-jdk-headless"},{"binary_version":"24.0.1+9~us1-0ubuntu1~25.04","binary_name":"openjdk-24-jre"},{"binary_version":"24.0.1+9~us1-0ubuntu1~25.04","binary_name":"openjdk-24-jre-headless"},{"binary_version":"24.0.1+9~us1-0ubuntu1~25.04","binary_name":"openjdk-24-jre-zero"},{"binary_version":"24.0.1+9~us1-0ubuntu1~25.04","binary_name":"openjdk-24-jvmci-jdk"},{"binary_version":"24.0.1+9~us1-0ubuntu1~25.04","binary_name":"openjdk-24-source"},{"binary_version":"24.0.1+9~us1-0ubuntu1~25.04","binary_name":"openjdk-24-testsupport"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7484-1.json","cves_map":{"ecosystem":"Ubuntu:25.04","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-21587"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-30691"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-30698"}]}}}],"schema_version":"1.7.3"}