it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5188-1] openjdk-11 security update
- Date: Fri, 22 Jul 2022 20:58:41 +0000
- Authentication-results: mail.piratenpartei.de; dkim=none; dmarc=none; spf=none (mail.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 2001:41b8:202:deb:216:36ff:fe40:4002) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"
- List-archive: https://lists.debian.org/msgid-search/20220722205841.GA1973 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=NUo2wJ1jY0VzfABT4AEJm6IMr+sHCmPPhqWwWoZ0ElE=; b=CH tsXJuf5tDXhMsG9iTLI/5VAbpIiHt+AMTdeKBOmvblPH/gFpngaPueJRq8avrlzz35NzxuVNeRrSe YvGu09HZuSFt3rWfiUaIm1ZwZ6WBmkW8aoT7p59xeXcYmjRbpOOChrJKd6VHMQPu7tokR5I3DsAJI MeVK5NxcEJG8CzX0WNBlBdbAHJZj/Zk7WHUTPklxOg8z9NP6VvDwkpyMFI8zRGXhnRMZ2v2RkKWgt BZQZ9U2pr7xGof0+u9rCitYkkoFnhi0wjxJx+VxVcwQTe5rxzgPlt6znzSgMAU7r5TXKbwoABHmU0 rVb76MD/BeWonRYHRih10QNzr5ZHnpsQ==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Fri, 22 Jul 2022 20:58:58 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <ggfw_AAIrBP.A.tqB.S-w2iB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5188-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 22, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openjdk-11
CVE ID : CVE-2022-21540 CVE-2022-21541 CVE-2022-34169
Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in the execution of arbitrary Java bytecode or the
bypass of the Java sandbox.
For the oldstable distribution (buster), these problems have been fixed
in version 11.0.16+8-1~deb10u1.
For the stable distribution (bullseye), these problems have been fixed in
version 11.0.16+8-1~deb11u1.
We recommend that you upgrade your openjdk-11 packages.
For the detailed security status of openjdk-11 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-11
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=R8Bz
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5188-1] openjdk-11 security update, Moritz Muehlenhoff, 22.07.2022
Archiv bereitgestellt durch MHonArc 2.6.24.