-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.3990
                        openjdk-17 security update
                             24 November 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           openjdk-17
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
                   Unauthorised Access      -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-35603 CVE-2021-35586 CVE-2021-35578
                   CVE-2021-35567 CVE-2021-35564 CVE-2021-35561
                   CVE-2021-35559 CVE-2021-35556 

Reference:         ESB-2021.3821
                   ESB-2021.3636
                   ESB-2021.3587

Original Bulletin: 
   http://www.debian.org/security/2021/dsa-5012

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5012-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 23, 2021                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : openjdk-17
CVE ID         : CVE-2021-35556 CVE-2021-35559 CVE-2021-35561 CVE-2021-35564 
                 CVE-2021-35567 CVE-2021-35578 CVE-2021-35586 CVE-2021-35603

Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in denial of service, incorrect Kerberos ticket use,
selection of weak ciphers or information disclosure.

For the stable distribution (bullseye), these problems have been fixed in
version 17.0.1+12-1+deb11u2.

We recommend that you upgrade your openjdk-17 packages.

For the detailed security status of openjdk-17 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-17

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=3f6F
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=DQeV
-----END PGP SIGNATURE-----