USN-7668-1

Source
https://ubuntu.com/security/notices/USN-7668-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7668-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7668-1
Upstream
Related
Published
2025-07-24T12:38:23Z
Modified
2026-02-10T04:49:41Z
Summary
openjdk-21 vulnerabilities
Details

It was discovered that the 2D component of OpenJDK 21 did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30749, CVE-2025-50106)

Mashroor Hasan Bhuiyan discovered that the JSSE component of OpenJDK 21 did not properly manage TLS 1.3 handshakes under certain circumstances. An attacker could possibly use this issue to obtain sensitive information. (CVE-2025-30754)

Martin van Wingerden and Violeta Georgieva of Broadcom discovered that the Networking component of OpenJDK 24 did not properly manage network connections under certain circumstances. An attacker could possibly use this issue to obtain sensitive information. (CVE-2025-50059)

In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.

Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2025-07-15

References

Affected packages

Ubuntu:Pro:20.04:LTS / openjdk-21

Package

Name
openjdk-21
Purl
pkg:deb/ubuntu/openjdk-21@21.0.8+9~us1-0ubuntu1~20.04.1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
21.0.8+9~us1-0ubuntu1~20.04.1

Affected versions

21.*
21.0.1+12-2~20.04.1
21.0.2+13-1~20.04.1
21.0.3+9-1ubuntu1~20.04.1
21.0.4+7-1ubuntu2~20.04
21.0.5+11-1ubuntu1~20.04
21.0.6+7-1~20.04.1
21.0.7+6~us1-0ubuntu1~20.04

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~20.04.1",
            "binary_name": "openjdk-21-demo"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~20.04.1",
            "binary_name": "openjdk-21-jdk"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~20.04.1",
            "binary_name": "openjdk-21-jdk-headless"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~20.04.1",
            "binary_name": "openjdk-21-jre"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~20.04.1",
            "binary_name": "openjdk-21-jre-headless"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~20.04.1",
            "binary_name": "openjdk-21-jre-zero"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~20.04.1",
            "binary_name": "openjdk-21-source"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~20.04.1",
            "binary_name": "openjdk-21-testsupport"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:Pro:20.04:LTS",
    "cves": []
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7668-1.json"

Ubuntu:22.04:LTS / openjdk-21

Package

Name
openjdk-21
Purl
pkg:deb/ubuntu/openjdk-21@21.0.8+9~us1-0ubuntu1~22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
21.0.8+9~us1-0ubuntu1~22.04.1

Affected versions

21.*
21.0.1+12-2~22.04
21.0.2+13-1~22.04.1
21.0.3+9-1ubuntu1~22.04.1
21.0.4+7-1ubuntu2~22.04
21.0.5+11-1ubuntu1~22.04
21.0.6+7-1~22.04.1
21.0.7+6~us1-0ubuntu1~22.04

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~22.04.1",
            "binary_name": "openjdk-21-demo"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~22.04.1",
            "binary_name": "openjdk-21-jdk"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~22.04.1",
            "binary_name": "openjdk-21-jdk-headless"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~22.04.1",
            "binary_name": "openjdk-21-jre"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~22.04.1",
            "binary_name": "openjdk-21-jre-headless"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~22.04.1",
            "binary_name": "openjdk-21-jre-zero"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~22.04.1",
            "binary_name": "openjdk-21-source"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~22.04.1",
            "binary_name": "openjdk-21-testsupport"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-30749"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-30754"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-50059"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-50106"
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7668-1.json"

Ubuntu:24.04:LTS / openjdk-21

Package

Name
openjdk-21
Purl
pkg:deb/ubuntu/openjdk-21@21.0.8+9~us1-0ubuntu1~24.04.1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
21.0.8+9~us1-0ubuntu1~24.04.1

Affected versions

Other
21+35-1
21.*
21.0.1+12-2
21.0.1+12-3
21.0.2+13-1
21.0.2+13-2
21.0.3~7ea-1
21.0.3~7ea-1build1
21.0.3~7ea-1build2
21.0.3+9-1
21.0.3+9-1ubuntu1
21.0.4+7-1ubuntu2~24.04
21.0.5+11-1ubuntu1~24.04
21.0.6+7-1~24.04.1
21.0.7+6~us1-0ubuntu1~24.04

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~24.04.1",
            "binary_name": "openjdk-21-demo"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~24.04.1",
            "binary_name": "openjdk-21-jdk"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~24.04.1",
            "binary_name": "openjdk-21-jdk-headless"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~24.04.1",
            "binary_name": "openjdk-21-jre"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~24.04.1",
            "binary_name": "openjdk-21-jre-headless"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~24.04.1",
            "binary_name": "openjdk-21-jre-zero"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~24.04.1",
            "binary_name": "openjdk-21-source"
        },
        {
            "binary_version": "21.0.8+9~us1-0ubuntu1~24.04.1",
            "binary_name": "openjdk-21-testsupport"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-30749"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-30754"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-50059"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-50106"
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7668-1.json"