First published: Tue May 06 2025(Updated: )
Alicja Kario discovered that the JSSE component of OpenJDK 11 incorrectly handled RSA padding. An Attacker could possibly use this issue to obtain sensitive information. (CVE-2025-21587) It was discovered that the Compiler component of OpenJDK 11 incorrectly handled compiler transformations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30691) It was discovered that the 2D component of OpenJDK 11 did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2025-30698) In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://openjdk.org/groups/vulnerability/advisories/2025-04-15
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-7481-1 is classified as high due to the potential for attackers to obtain sensitive information.
To fix USN-7481-1, users should update their OpenJDK packages to version 11.0.27+6~us1-0ubuntu1~24.04 or later.
USN-7481-1 affects the JSSE and Compiler components of OpenJDK 11.
USN-7481-1 addresses vulnerabilities related to incorrect handling of RSA padding and compiler transformations in OpenJDK 11.
The vulnerabilities in USN-7481-1 were discovered by researchers including Alicja Kario.