it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5738-1] openjdk-17 security update
- Date: Tue, 6 Aug 2024 19:34:06 +0000
- List-archive: https://lists.debian.org/msgid-search/ZrJ6rhLwVMnXBdor AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=LAC5oz84OE+0LuerNWNqiq3QWRYaPxQwT57euVRX7S4=; b=MP NOpvA9DAQDCKJtN/xDRmPBEu6Y13M/gX8a25F67RlwT3hXaNo3lCHyuZcQisa4N8QikkIfRR57Bpl 0Ed/AaG0HiiS7BF7touc09SOO5mjOtLz/SxR8coviUH1vyg+zh17bsI5wjYtcqz9Z+Lq4vl5uiTrj n87Bi5Z1fxhJBMrra0rsh2uIHyL6QfShJRoHtdKSWFFJABWudOUp+CXjYX1c1u6fqFQOuey5uNtEZ KexGMAHyROjQMqryM3kV1PFyXxWnT8TOu71ky/WydDdKbwQaq3N9ZdBwPhTxqzJfaU86ThgfVc+14 LRH7QbRnDnsVAuKf4h81DclwI4Pw+GOw==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Tue, 6 Aug 2024 19:34:35 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <dImXf_VI2sE.A.tPn.KrnsmB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5738-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 06, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openjdk-17
CVE ID : CVE-2024-21131 CVE-2024-21138 CVE-2024-21140
CVE-2024-21145 CVE-2024-21147
Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in denial of service, information disclosure or bypass
of Java sandbox restrictions.
For the oldstable distribution (bullseye), these problems have been fixed
in version 17.0.12+7-2~deb11u1.
For the stable distribution (bookworm), these problems have been fixed in
version 17.0.12+7-2~deb12u1.
We recommend that you upgrade your openjdk-17 packages.
For the detailed security status of openjdk-17 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-17
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmayebEACgkQEMKTtsN8
TjZWUg/+KoqnUpa4H2Hqf8C/7zsa7yKAIbenxDGci6biaAc20VQYWfBZw60td4Et
Vv99H+W8Q3aBYLf4nqhLuLX9YxFkTvSh9Ry/LUcn8+j0LkeVZpQYuG4G+dS9zlTe
0nKD3A5Ort+4Obqmz9GQmlE0QLRKN3PXvKkaoL5te2I73gL7E8/6adtJJnLcya5b
Uensq8CTwo/f3meWJTYUI/yAKpSE3ch4VLQGF/j8lTqbf2WUOOMx45x2saKxcQrR
4gXek88uY8nH7DA8NWB91p6WDc1jjQG501Jihpl+ayqkzQDoRf5PqZHUYOSy7shs
cP0cAN+jqznWl2TtTHFuX0XHizI6vYBXiJUEc/7crLExxnJ06CqmWZoj3WKysNmG
rALn5eDj3Wr+ddjvBjZ34QO3gzySBEWXb0MPB+INkO/Yowig02iU/UhoWG221QJJ
I/DG/20RQak6dfiyDcE0FolvLGYMv3VNXSBH7zMR8ZAv88KwimC7M//Cyk+H/1o0
zHrJJ25w3ppbMF7ubuq5K3RZm03Qcn9qOFzSWIX57XEfhWw2bbnVtIDav/h4Q4jn
8T+RYRO17vYChoVkoHPBD9yikAwDvKsHjq8l3QBviVpE2/CcgHnQRMI3GKRy94Mj
51zmQzbyc84ChkNnSaUOHxynY8HOGNeO/iZzXqP9BO4cGevYYh0=
=12rS
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5738-1] openjdk-17 security update, Moritz Muehlenhoff, 06.08.2024
Archiv bereitgestellt durch MHonArc 2.6.19+.