lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20160202213152.GA11865@pisco.westfalen.local>
Date: Tue, 2 Feb 2016 22:31:52 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3465-1] openjdk-6 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3465-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 02, 2016                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openjdk-6
CVE ID         : CVE-2015-7575 CVE-2016-0402 CVE-2016-0448 CVE-2016-0466 
                 CVE-2016-0483 CVE-2016-0494

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in breakouts of
the Java sandbox, information disclosur, denial of service and insecure
cryptography.

For the oldstable distribution (wheezy), these problems have been fixed
in version 6b38-1.13.10-1~deb7u1.

We recommend that you upgrade your openjdk-6 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=lEvn
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ