Lucene search

K
debianDebianDEBIAN:DLA-2325-1:3ADA8
HistoryAug 13, 2020 - 10:07 a.m.

[SECURITY] [DLA 2325-1] openjdk-8 security update

2020-08-1310:07:24
lists.debian.org
32
openjdk debian9stretch securityupdate denialofservice informationdisclosure bypassaccessrestrictions cve-2020-14556 cve-2020-14577 cve-2020-14578 cve-2020-14579 cve-2020-14581 cve-2020-14583 cve-2020-14593 cve-2020-14621

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8.3

Confidence

Low

EPSS

0.003

Percentile

71.8%


Debian LTS Advisory DLA-2325-1 [email protected]
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
August 13, 2020 https://wiki.debian.org/LTS


Package : openjdk-8
Version : 8u265-b01-0+deb9u1
CVE ID : CVE-2020-14556 CVE-2020-14577 CVE-2020-14578 CVE-2020-14579
CVE-2020-14581 CVE-2020-14583 CVE-2020-14593 CVE-2020-14621

Several vulnerabilities have been discovered in the OpenJDK Java runtime,
resulting in denial of service, bypass of access/sandbox restrictions or
information disclosure.

For Debian 9 stretch, these problems have been fixed in version
8u265-b01-0+deb9u1.

We recommend that you upgrade your openjdk-8 packages.

For the detailed security status of openjdk-8 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-8

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8.3

Confidence

Low

EPSS

0.003

Percentile

71.8%