-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1826
                         openjdk-8 security update
                               26 July 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           openjdk-8
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Access Privileged Data          -- Remote/Unauthenticated      
                   Modify Arbitrary Files          -- Remote with User Interaction
                   Denial of Service               -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-10198 CVE-2017-10193 CVE-2017-10176
                   CVE-2017-10135 CVE-2017-10118 CVE-2017-10116
                   CVE-2017-10115 CVE-2017-10111 CVE-2017-10110
                   CVE-2017-10109 CVE-2017-10108 CVE-2017-10107
                   CVE-2017-10102 CVE-2017-10101 CVE-2017-10096
                   CVE-2017-10090 CVE-2017-10089 CVE-2017-10087
                   CVE-2017-10081 CVE-2017-10078 CVE-2017-10074
                   CVE-2017-10067 CVE-2017-10053 

Reference:         ASB-2017.0108

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-3919

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3919-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 25, 2017                         https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : openjdk-8
CVE ID         : CVE-2017-10053 CVE-2017-10067 CVE-2017-10074
                 CVE-2017-10078 CVE-2017-10081 CVE-2017-10087
		 CVE-2017-10089 CVE-2017-10090 CVE-2017-10096
		 CVE-2017-10101 CVE-2017-10102 CVE-2017-10107 
                 CVE-2017-10108 CVE-2017-10109 CVE-2017-10110
		 CVE-2017-10111 CVE-2017-10115 CVE-2017-10116
		 CVE-2017-10118 CVE-2017-10135 CVE-2017-10176
		 CVE-2017-10193 CVE-2017-10198

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in sandbox bypass,
use of insecure cryptography, side channel attacks, information
disclosure, the execution of arbitrary code, denial of service or
bypassing Jar verification.

For the stable distribution (stretch), these problems have been fixed in
version 8u141-b15-1~deb9u1.

For the unstable distribution (sid), these problems have been fixed in
version 8u141-b15-1.

We recommend that you upgrade your openjdk-8 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=/7uQ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=1Shj
-----END PGP SIGNATURE-----