what you don't know can hurt you

Debian Security Advisory 3316-1

Debian Security Advisory 3316-1
Posted Jul 27, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3316-1 - Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, breakouts of the Java sandbox, information disclosure, denial of service or insecure cryptography.

tags | advisory, java, denial of service, arbitrary, vulnerability, info disclosure
systems | linux, debian
advisories | CVE-2014-8873, CVE-2015-0460, CVE-2015-0469, CVE-2015-0470, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0488, CVE-2015-2590, CVE-2015-2601, CVE-2015-2613, CVE-2015-2621, CVE-2015-2625, CVE-2015-2628, CVE-2015-2632, CVE-2015-2808, CVE-2015-4000, CVE-2015-4731, CVE-2015-4732, CVE-2015-4733, CVE-2015-4748, CVE-2015-4749, CVE-2015-4760
MD5 | ae28b23356aaf98f529c66ae55cd41f3

Debian Security Advisory 3316-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3316-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 25, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openjdk-7
CVE ID : CVE-2014-8873 CVE-2015-0460 CVE-2015-0469 CVE-2015-0470
CVE-2015-0477 CVE-2015-0478 CVE-2015-0480 CVE-2015-0488
CVE-2015-2590 CVE-2015-2601 CVE-2015-2613 CVE-2015-2621
CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 CVE-2015-2808
CVE-2015-4000 CVE-2015-4731 CVE-2015-4732 CVE-2015-4733
CVE-2015-4748 CVE-2015-4749 CVE-2015-4760

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in the execution
of arbitrary code, breakouts of the Java sandbox, information disclosure,
denial of service or insecure cryptography.

For the oldstable distribution (wheezy), these problems have been fixed
in version 7u79-2.5.6-1~deb7u1.

For the stable distribution (jessie), these problems have been fixed in
version 7u79-2.5.6-1~deb8u1.

For the unstable distribution (sid), these problems have been fixed in
version 7u79-2.5.6-1.

We recommend that you upgrade your openjdk-7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=aOkr
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    10 Files
  • 7
    Dec 7th
    1 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    15 Files
  • 10
    Dec 10th
    30 Files
  • 11
    Dec 11th
    8 Files
  • 12
    Dec 12th
    20 Files
  • 13
    Dec 13th
    6 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close