First published: Tue Jul 16 2019(Updated: )
A flaw was found in the way the JSSE component of OpenJDK handled certificate status / OCSP stapling message during TLS handshake. A remote attacker could possibly use this flaw to gain access to certain sensitive information by manipulating TLS handshake messages.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =11.0.3 | |
Oracle JDK | =12.0.1 | |
Oracle JRE | =11.0.3 | |
Oracle JRE | =12.0.1 | |
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.25+9-1~deb11u1 11.0.26~6ea-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-2821 is medium.
An unauthenticated attacker with network access via TLS can compromise Java SE.
Java SE versions 11.0.3 and 12.0.1 are affected by CVE-2019-2821.
To fix CVE-2019-2821 in Debian, update to openjdk-11 version 11.0.16+8-1~deb10u1 or newer.
You can find more information about CVE-2019-2821 from the following sources: - Oracle Security Advisory: http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Ubuntu Security Notice: https://usn.ubuntu.com/4083-1/ - openSUSE Security Announcement: http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html