4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
7.2 High
AI Score
Confidence
Low
0.004 Low
EPSS
Percentile
72.1%
Debian LTS Advisory DLA-2634-1 [email protected]
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
April 23, 2021 https://wiki.debian.org/LTS
Package : openjdk-8
Version : 8u292-b10-0+deb8u1
CVE ID : CVE-2021-2161 CVE-2021-2163
Several vulnerabilities have been discovered in the OpenJDK Java runtime,
resulting in bypass of sandbox restrictions.
For Debian 9 stretch, these problems have been fixed in version
8u292-b10-0+deb8u1.
We recommend that you upgrade your openjdk-8 packages.
For the detailed security status of openjdk-8 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-8
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | i386 | openjdk-11-jdk | < 11.0.11+9-1~deb10u1 | openjdk-11-jdk_11.0.11+9-1~deb10u1_i386.deb |
Debian | 9 | armhf | openjdk-8-jre-zero | < 8u292-b10-0+deb9u1 | openjdk-8-jre-zero_8u292-b10-0+deb9u1_armhf.deb |
Debian | 10 | mips64el | openjdk-11-demo | < 11.0.11+9-1~deb10u1 | openjdk-11-demo_11.0.11+9-1~deb10u1_mips64el.deb |
Debian | 10 | mipsel | openjdk-11-jre | < 11.0.11+9-1~deb10u1 | openjdk-11-jre_11.0.11+9-1~deb10u1_mipsel.deb |
Debian | 10 | mips | openjdk-11-dbg | < 11.0.11+9-1~deb10u1 | openjdk-11-dbg_11.0.11+9-1~deb10u1_mips.deb |
Debian | 10 | mips64el | openjdk-11-jdk | < 11.0.11+9-1~deb10u1 | openjdk-11-jdk_11.0.11+9-1~deb10u1_mips64el.deb |
Debian | 9 | i386 | openjdk-8-jdk-headless | < 8u292-b10-0+deb9u1 | openjdk-8-jdk-headless_8u292-b10-0+deb9u1_i386.deb |
Debian | 9 | armhf | openjdk-8-jre-headless | < 8u292-b10-0+deb9u1 | openjdk-8-jre-headless_8u292-b10-0+deb9u1_armhf.deb |
Debian | 9 | all | openjdk-8-doc | < 8u292-b10-0+deb9u1 | openjdk-8-doc_8u292-b10-0+deb9u1_all.deb |
Debian | 10 | all | openjdk-11-doc | < 11.0.11+9-1~deb10u1 | openjdk-11-doc_11.0.11+9-1~deb10u1_all.deb |
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
7.2 High
AI Score
Confidence
Low
0.004 Low
EPSS
Percentile
72.1%