[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 4037-1] openjdk-11 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4037-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/               Emilio Pozuelo Monfort
January 31, 2025                              https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : openjdk-11
Version        : 11.0.26+4-1~deb11u1
CVE ID         : CVE-2025-21502

An issue was found in the OpenJDK Java runtime, which may result in
unauthorized access.

For Debian 11 bullseye, this problem has been fixed in version
11.0.26+4-1~deb11u1.

We recommend that you upgrade your openjdk-11 packages.

For the detailed security status of openjdk-11 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-11

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=bifb
-----END PGP SIGNATURE-----


Reply to: