lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 26 Apr 2016 22:25:06 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3558-1] openjdk-7 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3558-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
April 26, 2016                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openjdk-7
CVE ID         : CVE-2016-0636 CVE-2016-0686 CVE-2016-0687 CVE-2016-0695 
                 CVE-2016-3425 CVE-2016-3426 CVE-2016-3427

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in breakouts of
the Java sandbox, denial of service or information disclosure.

For the stable distribution (jessie), these problems have been fixed in
version 7u101-2.6.6-1~deb8u1.

We recommend that you upgrade your openjdk-7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBCAAGBQJXH837AAoJEBDCk7bDfE42T0QP+QGxR+OgBILJHNJTKzZEaCH0
vVuYoMqnPOJAauIxkeT42iDd9r3lIIYDtwM1QmGYAcJpC+i70qwXdufFNOJoXZ+q
nd57UdI2ggnzHkCwqzqQt7BFgOJ+o0VqXuXuezWErdHAIoTN8H0uE9vQJ4Le0ASj
VmKAzNO49ZMhDxrXOTDRFEZCEF2c2+cQ4y5w7Jfs1m1KxWpkQ9MlbQrXtJJYHR2d
opvW9ifTLpND9lAir2TD0oB826g9kY2HySc90e6GxK7Y8l9n2l2eUNYcka2b4DXb
wu/xCrvdB5B4czDXzMJGbo59upsh9u4DOTZpt2I2oWgxDR6wodNHCla4ExfGokOg
TJmO6PYSNuzUQNkXqt7SfME09DfoMBLFSvZ1Rj58whM4XaT15MRkHFXtW/qQPD3i
jOGVVRFn9o0961o6QXe+GrMd6/GfOX9/iK7wapH9Zozpd8Tftp73ZvDsxZseH+vF
lrT8oI7cdLO5vqHeFTahcz0wIVsTFpC6unHW/0ivcBSy58G90BYC3qEU3UebAkfd
6h0GNfC9x5xL2vmHHKYgdgRqrmdUdJlgS5s2ay4SE4cLXoaFOBgT7OK76VDobkYO
TAmvUGrFCeMuNKc1l5p+nLCG5F3RnogDONNXjWSwlM6NSjIm/C6YLoAYYXJrjYXB
G699bO+MYk5QquS65HJx
=Rabo
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ