{"id":"USN-7531-1","summary":"openjdk-21-crac vulnerabilities","details":"Alicja Kario discovered that the JSSE component of CRaC JDK 21 incorrectly\nhandled RSA padding. An Attacker could possibly use this issue to obtain\nsensitive information. (CVE-2025-21587)\n\nIt was discovered that the Compiler component of CRaC JDK 21 incorrectly\nhandled compiler transformations. An attacker could possibly use this\nissue to cause a denial of service or execute arbitrary code.\n(CVE-2025-30691)\n\nIt was discovered that the 2D component of CRaC JDK 21 did not properly\nmanage memory under certain circumstances. An attacker could possibly use\nthis issue to cause a denial of service or execute arbitrary code.\n(CVE-2025-30698)\n\nIn addition to security fixes, the updated packages contain bug fixes, new\nfeatures, and possibly incompatible changes.\n\nPlease see the following for more information:\nhttps://openjdk.org/groups/vulnerability/advisories/2025-04-15","modified":"2026-01-30T02:32:25.943642Z","published":"2025-05-26T03:29:48.840532Z","related":["UBUNTU-CVE-2025-21587","UBUNTU-CVE-2025-30691","UBUNTU-CVE-2025-30698"],"upstream":["CVE-2025-21587","CVE-2025-30691","CVE-2025-30698","UBUNTU-CVE-2025-21587","UBUNTU-CVE-2025-30691","UBUNTU-CVE-2025-30698"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7531-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21587"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-30691"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-30698"}],"affected":[{"package":{"name":"openjdk-21-crac","ecosystem":"Ubuntu:25.04","purl":"pkg:deb/ubuntu/openjdk-21-crac@21.0.7+6.1-0ubuntu1~25.04?arch=source&distro=plucky"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"21.0.7+6.1-0ubuntu1~25.04"}]}],"versions":["21.0.5+0-0ubuntu2","21.0.5+11-0ubuntu1","21.0.6+7-0ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"openjdk-21-crac-demo","binary_version":"21.0.7+6.1-0ubuntu1~25.04"},{"binary_name":"openjdk-21-crac-jdk","binary_version":"21.0.7+6.1-0ubuntu1~25.04"},{"binary_name":"openjdk-21-crac-jdk-headless","binary_version":"21.0.7+6.1-0ubuntu1~25.04"},{"binary_name":"openjdk-21-crac-jre","binary_version":"21.0.7+6.1-0ubuntu1~25.04"},{"binary_name":"openjdk-21-crac-jre-headless","binary_version":"21.0.7+6.1-0ubuntu1~25.04"},{"binary_name":"openjdk-21-crac-jre-zero","binary_version":"21.0.7+6.1-0ubuntu1~25.04"},{"binary_name":"openjdk-21-crac-source","binary_version":"21.0.7+6.1-0ubuntu1~25.04"},{"binary_name":"openjdk-21-crac-testsupport","binary_version":"21.0.7+6.1-0ubuntu1~25.04"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7531-1.json","cves_map":{"ecosystem":"Ubuntu:25.04","cves":[{"id":"CVE-2025-21587","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-30691","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-30698","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}