Debian Linux Security Advisory 5458-1 - Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in bypass of sandbox restrictions, information disclosure, reduced cryptographic strength of the AES implementation, directory traversal or denial of service.
56826eebf6a5edd1903ff8a78cf717b85576a27002c8d40f49867c4087279cf9
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5458-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 25, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openjdk-17
CVE ID : CVE-2023-22006 CVE-2023-22036 CVE-2023-22041 CVE-2023-22044
CVE-2023-22045 CVE-2023-22049
Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in bypass of sandbox restrictions, information
disclosure, reduced cryptographic strength of the AES implementation,
directory traversal or denial of service.
For the oldstable distribution (bullseye) additional build dependencies
need to be backported, a fixed package will be provided when these are
ready as 17.0.8+7-1~deb11u1.
For the stable distribution (bookworm), these problems have been fixed in
version 17.0.8+7-1~deb12u1.
We recommend that you upgrade your openjdk-17 packages.
For the detailed security status of openjdk-17 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-17
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=Fjqe
-----END PGP SIGNATURE-----