lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20140723195130.GB3280@pisco.westfalen.local>
Date: Wed, 23 Jul 2014 21:51:31 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 2987-1] openjdk-7 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2987-1                   security@...ian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
July 23, 2014                          http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openjdk-7
CVE ID         : CVE-2014-2483 CVE-2014-2490 CVE-2014-4209 CVE-2014-4216 
                 CVE-2014-4218 CVE-2014-4219 CVE-2014-4221 CVE-2014-4223
                 CVE-2014-4244 CVE-2014-4252 CVE-2014-4262 CVE-2014-4263
                 CVE-2014-4264 CVE-2014-4266 CVE-2014-4268

Several vulnerabilities have been discovered in OpenJDK, an 
implementation of the Oracle Java platform, resulting in the execution of 
arbitrary code, breakouts of the Java sandbox, information disclosure or
denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 7u65-2.5.1-2~deb7u1.

For the unstable distribution (sid), these problems have been fixed in
version 7u65-2.5.1-1.

We recommend that you upgrade your openjdk-7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=I9a7
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ