Debian Linux Security Advisory 4779-1 - Several vulnerabilities have been discovered in the OpenJDK Java runtime, which could result in denial of service, information disclosure, bypass of access/sandbox restrictions or the acceptance of untrusted certificates.
731b49476c241c261998bff0a7538272dbdfcf0f2dbdba514432e1387a43d49e
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4779-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 25, 2020 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openjdk-11
CVE ID : CVE-2020-14779 CVE-2020-14781 CVE-2020-14782 CVE-2020-14792
CVE-2020-14796 CVE-2020-14797 CVE-2020-14798 CVE-2020-14803
Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which could result in denial of service, information disclosure, bypass of
access/sandbox restrictions or the acceptance of untrusted certificates.
For the stable distribution (buster), these problems have been fixed in
version 11.0.9+11-1~deb10u1.
We recommend that you upgrade your openjdk-11 packages.
For the detailed security status of openjdk-11 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-11
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=48nH
-----END PGP SIGNATURE-----