-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3664
                        openjdk-11 security update
                              26 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           openjdk-11
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-14803 CVE-2020-14798 CVE-2020-14797
                   CVE-2020-14796 CVE-2020-14792 CVE-2020-14782
                   CVE-2020-14781 CVE-2020-14779 

Reference:         ASB-2020.0175
                   ESB-2020.3648

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2020/msg00186.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4779-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 25, 2020                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : openjdk-11
CVE ID         : CVE-2020-14779 CVE-2020-14781 CVE-2020-14782 CVE-2020-14792 
                 CVE-2020-14796 CVE-2020-14797 CVE-2020-14798 CVE-2020-14803

Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which could result in denial of service, information disclosure, bypass of
access/sandbox restrictions or the acceptance of untrusted certificates.

For the stable distribution (buster), these problems have been fixed in
version 11.0.9+11-1~deb10u1.

We recommend that you upgrade your openjdk-11 packages.

For the detailed security status of openjdk-11 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-11

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl+VT6wACgkQEMKTtsN8
TjYFdBAAgOJW0nEM2uttbtaYykt2/d10VmtXiYXUDz77lewWZCHBFsGidea7Ey1Z
j3YYa6ZQUuEJIFGnUK0uHvXS1g+bS9go9OZ1wrEcUR9SLomct7hrqqIlh/oT6cJQ
0MSFeJ8E8uZF/H2lDttz4HAqwyF0MGs1U4C6Ou5guv08vwKhfb2EzJ95X9n1zNk7
9xxA+s1EWSLUQmDAAcWZqkTrelKFIaHTSgUXJwQQIDHKiY7Eef77RU3OnrdTgLig
95vE/liSWFBTfcdvReJ7hG8y3DhNgVdJYwuDe9Azxc5TkRNLY/1LdUTI/FmoyLjP
ySazKokoeYI/YWahB00v2rCmJYvdKS+3fqvbRhsicXeNJNaqsWfQ6CSce4Z8EbUu
cVqDBKL+296ah15a0XIo68Oo0lYvQIx6dgK5/BBRhifLVzRaZWIEIk7itqY4jO67
SGLlzjiYciZdzNcNad5Ad7fG1s+l2ea9SBE8ycQ0hPgNBPrBLBh3dr1K84VOZkzZ
C4h/munp3VZ3/4bRijEiI5dkB8u7M307cqNWO8ArTmK+SZPwp0VNw2C1HZdHd+3Z
hCzDrP+YYszpzufZk1pDd1bXijb3Jsaw83W++u9iTHykUS1o7lLmtkbyJqcBJoOe
oXxWnG4wLK2DZ3/YGtAP/4FRl+LkHQZC9HldPYXdlV5X7Pl0gFw=
=48nH
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=0l3M
-----END PGP SIGNATURE-----