[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 5312-1] libjettison-java security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5312-1                   security@debian.org
https://www.debian.org/security/                          Markus Koschany
January 11, 2023                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libjettison-java
CVE ID         : CVE-2022-40149 CVE-2022-40150 CVE-2022-45685 CVE-2022-45693
Debian Bug     : 1022553 1022554

Several flaws have been discovered in libjettison-java, a collection of StAX
parsers and writers for JSON. Specially crafted user input may cause a denial
of service via out-of-memory or stack overflow errors.

For the stable distribution (bullseye), these problems have been fixed in
version 1.5.3-1~deb11u1.

We recommend that you upgrade your libjettison-java packages.

For the detailed security status of libjettison-java please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libjettison-java

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=1lWy
-----END PGP SIGNATURE-----


Reply to: