Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 5857-1] openjdk-17 security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 5857-1] openjdk-17 security update


Chronologisch Thread  
  • From: Moritz Muehlenhoff <jmm AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 5857-1] openjdk-17 security update
  • Date: Mon, 3 Feb 2025 18:42:16 +0000
  • Authentication-results: lists.piratenpartei.de; dkim=none; spf=none (lists.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 82.195.75.100) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"; dmarc=none
  • List-archive: https://lists.debian.org/msgid-search/Z6EOCNd0GlJrY1E+ AT seger.debian.org
  • List-id: <debian-security-announce.lists.debian.org>
  • List-url: <http://lists.debian.org/debian-security-announce/>
  • Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=oWeBX9rJYlzOT04oBOyei5z48jnS1waj7P523Av4NDU=; b=uU ff5uFaLHisu9hEGfoLHtKVMH9lnWQiaeVWUIjYQM2V/49m3XPuI5hy17s6MnHrimmRe2H5OS3LKFM 6D1/SW8eYUVxXSlc+aStjR/D4/2k1LNpFosxjfaTjwl/buVa7Vyrvoq9bVSgRuzdXPkBv/VVsVN00 hGHGF0eYN9hsMZl658Dj0+uR6zjmkl2zRxeNiZgBJZxsGw9aOxC0rOKJpHY/qU3jN91KTRxNdANZ/ Qu1rqRE9QHJ6mM869DYYrHpanoDsxPrjupau9X9sOfZ7g4sXTLpl9QaP8DoIk0f4xB6wHMzUenLRJ a/PmhW8OqdgEfWRVpTavdLxaLBGpDZtA==;
  • Old-return-path: <jmm AT seger.debian.org>
  • Priority: urgent
  • Resent-date: Mon, 3 Feb 2025 18:42:37 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <506ADi5seNI.A.jeqP.d4QonB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5857-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 03, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openjdk-17
CVE ID : CVE-2025-21502

A vulnerability has been discovered in the OpenJDK Java runtime, which
may result in authorisation bypass or information disclosure.

For the stable distribution (bookworm), this problem has been fixed in
version 17.0.14+7-1~deb12u1.

We recommend that you upgrade your openjdk-17 packages.

For the detailed security status of openjdk-17 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-17

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=USw8
-----END PGP SIGNATURE-----



  • [IT-SecNots] [SECURITY] [DSA 5857-1] openjdk-17 security update, Moritz Muehlenhoff, 03.02.2025

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang