Lucene search

K
debianDebianDEBIAN:DSA-5058-1:18194
HistoryJan 25, 2022 - 7:58 p.m.

[SECURITY] [DSA 5058-1] openjdk-17 security update

2022-01-2519:58:47
lists.debian.org
48
openjdk-17
security update
debian
cve-2022-21248
cve-2022-21277
cve-2022-21282
bypass of deserialization restrictions
information disclosure
denial of service

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

7

Confidence

Low

EPSS

0.004

Percentile

74.0%


Debian Security Advisory DSA-5058-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
January 24, 2022 https://www.debian.org/security/faq


Package : openjdk-17
CVE ID : CVE-2022-21248 CVE-2022-21277 CVE-2022-21282 CVE-2022-21283
CVE-2022-21291 CVE-2022-21293 CVE-2022-21294 CVE-2022-21296
CVE-2022-21299 CVE-2022-21305 CVE-2022-21340 CVE-2022-21341
CVE-2022-21360 CVE-2022-21365 CVE-2022-21366

Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in denial of service, bypass of deserialization
restrictions or information disclosure.

For the stable distribution (bullseye), these problems have been fixed in
version 17.0.2+8-1~deb11u1.

We recommend that you upgrade your openjdk-17 packages.

For the detailed security status of openjdk-17 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-17

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

7

Confidence

Low

EPSS

0.004

Percentile

74.0%