• [SECURITY] [DSA 5458-1] openjdk-17 security update

    From Moritz Muehlenhoff@21:1/5 to All on Tue Jul 25 21:00:01 2023
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-5458-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff
    July 25, 2023 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : openjdk-17
    CVE ID : CVE-2023-22006 CVE-2023-22036 CVE-2023-22041 CVE-2023-22044
    CVE-2023-22045 CVE-2023-22049

    Several vulnerabilities have been discovered in the OpenJDK Java runtime,
    which may result in bypass of sandbox restrictions, information
    disclosure, reduced cryptographic strength of the AES implementation,
    directory traversal or denial of service.

    For the oldstable distribution (bullseye) additional build dependencies
    need to be backported, a fixed package will be provided when these are
    ready as 17.0.8+7-1~deb11u1.

    For the stable distribution (bookworm), these problems have been fixed in version 17.0.8+7-1~deb12u1.

    We recommend that you upgrade your openjdk-17 packages.

    For the detailed security status of openjdk-17 please refer to
    its security tracker page at: https://security-tracker.debian.org/tracker/openjdk-17

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmTAGOoACgkQEMKTtsN8 Tjb8nRAAvq9DlNtduOec61Hw9i0O8plyHPvMGuz7iG9usczk95ENCOfasp/VbIF4 pqCSnwVwbSF02vSiodXETzjiK9+qHYHGiXCQ8j0U/Tiav5/wcx9O9h1CIhcuEsMp 7pULUjSq52kh3wbTf7/UU8ogiSTxjZ6GY6wrEJJC6GnjKc3SAyc/D1uo85mG2ubk kD/G1w9V0egcCiopo/DejU/zzrTMc0/SiG3xksA8cmCICu0R2hvY6vLASZ42qwO3 DYtWEQE4imDsUhhw3fXOs4zxT5mbLVZd2wO8+S7LY3y6uiEXL44inYHugljnG/0k ea3NjiUPIm0ffdaq9DMYfoGHvho5tiFTMF5Y9p7Llhl0mZ13B2IS+tyADBuJhTmc p4JaB0Ls95w6ZU9LCMLIN9TBjBOK2r0i25oiNmgxlvg/ZJ3+S3L6oUypAFLYokNx vFCt/04mWsVdYZir32zD7sZ2jqk0ehqF6aMLPBqvLc/ic89oZXg+mcsXdB54wsnA orLo5H5ZN5P6yEJ9tILFlOPanUewZCr8oWmJkTe8ogYEQIkUkryXxD5GF3lAfpxs bmLKNvFe5sWloXJEvCm9CzBkmoJtAsgAyNY5O2gQwEG6gna6t5sKN0cYK5+LXK8f PWSkXLDYqgUSVeJGL+V0aU2wE5qTfovbv8nH30IoEB6kSBofv+k=
    =Fjqe
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)