Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.3990 openjdk-17 security update 24 November 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: openjdk-17 Publisher: Debian Operating System: Debian GNU/Linux Impact/Access: Modify Arbitrary Files -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-35603 CVE-2021-35586 CVE-2021-35578 CVE-2021-35567 CVE-2021-35564 CVE-2021-35561 CVE-2021-35559 CVE-2021-35556 Reference: ESB-2021.3821 ESB-2021.3636 ESB-2021.3587 Original Bulletin: http://www.debian.org/security/2021/dsa-5012 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5012-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff November 23, 2021 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : openjdk-17 CVE ID : CVE-2021-35556 CVE-2021-35559 CVE-2021-35561 CVE-2021-35564 CVE-2021-35567 CVE-2021-35578 CVE-2021-35586 CVE-2021-35603 Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in denial of service, incorrect Kerberos ticket use, selection of weak ciphers or information disclosure. For the stable distribution (bullseye), these problems have been fixed in version 17.0.1+12-1+deb11u2. We recommend that you upgrade your openjdk-17 packages. For the detailed security status of openjdk-17 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openjdk-17 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmGdXF4ACgkQEMKTtsN8 Tjb8mw/+M7+egh3GdRDxRYFONbyfC6DdiuRhGjJ2lq8lwCQGqqEV6CHilydGHWfH 7qIhh+JInYXuKzTtgoRWmk9aI0Um11W48Rma1ZP5XAHZnsDVqVbPbmhzC12hukv+ bMZ0USEqNVN7M25NftMTpIfwan4KvT2xKn88U6wRYd6qv2P/E471KcDJ5sI5cYv6 Wj7BULfyt/op22qyorBhluc0fRPFdaqluapc1G1RTDpqJ5a+DS6q5G8EoTW+/k4X X36mzWVAQ7sBA78UxSuVT347wq0fUJKsSst4Q/GhKSFLS6IU7YkuqT1GaF8PkQ1e wSrk4r6SmZhvcGOLgJmNg/X1FTHdG9q/hr0g8U3eb+0kn46GyRhMhhd8HCzAfPPD 8eAjQSXLX9GuOMg4BVvByT0s6NtJVqwq9QHecw5hUE2o2jbZrXtgr33ZBBJ6uhPP lS9hJtglwnPPA0CD+Zd53upcYoPijOF/2WTjX7vTNJ3rodf31JzLIx9AFTrW/6VI QTIE2IyvLgqEWWHsm1OhDQ/YAffQ8CwzaADgNUWy3HFRA5/Apby4GBtlTbUh0HRD mDv9iJUElezNIp62n2aPOtsQwT6Vraowe54gZPxGQT3D+mOG3l2NHSp2t5kYYQB1 XqyMbX752io2/CJmr2HJg/22vNXQJIMYx1zVCSAwQBn4C6qRWiE= =3f6F - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYZ24TeNLKJtyKPYoAQgEYw//UUlqch4o6HjB6WNx+Lpe6DrA979/pYRk XykXP7+qTjVahUDMF1XaA3TiFcESPMq4iRt5hHvMecM3pr88pilMXgpeL+S3jtoj 1WLgtQUMvpmzCVnOSdqKLCprv5iP22oDD6Tr4/RgUSVoufpUUjV5Ue40Kw+iiSzR N04lRldN7ap5ZCOLNIMGEDyr1R/ueHlDulc0fSajy+sWE4vk7QvZXI+1GyR50J7u BiZhOXmF2HzTUBNjcBrglwoZXxRsIsU+7VXU+20b34Y7EylT0HJmfkaQuTN2ZR+c gZNheqoqfqYJ54DECVnx619jLzfC+sozIh8rdBhjHAhQKXCi0HBJV1Jah0ZLJJWG GiWwgQvBTppP9f+Ispc/ZnUhthJQ7NUQzNpUGfMzKwN1vJml2Am7zAJjdO+3Hozm baGQQoRChacXo6GR5uklT1A6Jwhs1fFM28MqSwC7QvH6pDkWuu7Il/1Dc4aR3LaX 6PYNsT3UheOObz9AyrJd0BSFvzweW7tUbjBEcr0N/+qadtg51cDK6HlccMPsi84W hgw2sA+PxtbjHDfJvCUu02FmW4qSjv/roxvng8VsBMTi2HpxQncggd4phTSDgXFt ezyFqp+2oEnfL7rix+CWJier6Aw8p36pCieN07vWT9UGItV6oqwl/oXtHGOMl6sH dXOPyQ5Ls6g= =DQeV -----END PGP SIGNATURE-----