[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1dO1Mr-000619-7u@master.debian.org>
Date: Thu, 22 Jun 2017 12:37:49 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3893-1] jython security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3893-1 security@...ian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 22, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : jython
CVE ID : CVE-2016-4000
Debian Bug : 864859
Alvaro Munoz and Christian Schneider discovered that jython, an
implementation of the Python language seamlessly integrated with Java,
is prone to arbitrary code execution triggered when sending a serialized
function to the deserializer.
For the oldstable distribution (jessie), this problem has been fixed
in version 2.5.3-3+deb8u1.
For the stable distribution (stretch), this problem has been fixed in
version 2.5.3-16+deb9u1.
For the unstable distribution (sid), this problem has been fixed in
version 2.5.3-17.
We recommend that you upgrade your jython packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAllLudlfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0ToGw/+MK3U6RBkBbh3sv9fNxgY9Ou+yj7dSeUhN4P8511145goAHgM0PvSI/Ml
PsPgOZDrnnymc8GYn2bGXWqVcWgqrXnIvycz1J8orvLnJfPb13ww3t+XlKs/Vrrv
Prj6ROiC0cmbNeKbuR+ly2qaysYcippl5SmpnhOEbJkXf8fsBYqIWo+WThAIE2NO
0X2CPP3iiS3N0NLHmEUBicXd0osZGkTrDznSCJ/mi7RaY30WISJbkuUoepILg+Qi
c9b2ZEkOGn9MxBfh8dAeY2j/hpUXGIWVZrmBE7t9ertMQ7wc2JS/Tmgiy/kAttFB
D2CiQQ0laZfJFUXyTr00i+t80A4RamsIfnvMZ1fly4IjJnVaRw7M9umlw0dnQmBd
hbLwDIOZnHSU0e5pBLMT6a62ENivyY8SoOmHC0lNyTAIHqHzKO9IOUx9taNuFiUM
kEaE/9qTYNuUS4JstMZ04lonvx06pjg5oMd4JyMJrav5wq7xes7bLGVTgaKzUgxb
nJwpSFyQhLJmz5XhjD4O/gMS1PdFHvoxTJeOfrB7E/kMSQnkT6+gvZGUb17n51Bo
FB+k92EDlcsSRjYFPcxQmNw/H8pRjpMLTMQN07bltU2ZnILm212wrDsccw/qk960
SW7QsVoWzFuxVsk36xArq/96h5Y7lW4wHgUlw5H5g/F2KQvEeZ8=
=3zEd
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists