—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-4268-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 10, 2018 https://www.debian.org/security/faq
– ————————————————————————-
Package : openjdk-8
CVE ID : CVE-2018-2952
It was discovered that the PatternSyntaxException class in the
Concurrency component of OpenJDK, an implementation of the Oracle Java
platform could result in denial of service via excessive memory
consumption.
For the stable distribution (stretch), this problem has been fixed in
version 8u181-b13-1~deb9u1.
We recommend that you upgrade your openjdk-8 packages.
For the detailed security status of openjdk-8 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-8
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=nN0M
—–END PGP SIGNATURE—–