[SECURITY] [DSA 2923-1] openjdk-7 security update

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2923-1                   security@xxxxxxxxxx
http://www.debian.org/security/                        Moritz Muehlenhoff
May 05, 2014                           http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openjdk-7
CVE ID         : CVE-2013-6629 CVE-2013-6954 CVE-2014-0429 CVE-2014-0446 
                 CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0454
                 CVE-2014-0455 CVE-2014-0456 CVE-2014-0457 CVE-2014-0458
                 CVE-2014-0459 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876 
                 CVE-2014-2397 CVE-2014-2398 CVE-2014-2402 CVE-2014-2403 
                 CVE-2014-2412 CVE-2014-2413 CVE-2014-2414 CVE-2014-2421
                 CVE-2014-2423 CVE-2014-2427

Several vulnerabilities have been discovered in OpenJDK, an 
implementation of the Oracle Java platform, resulting in the execution 
of arbitrary code, breakouts of the Java sandbox, information disclosure
or denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 7u55-2.4.7-1~deb7u1.

For the unstable distribution (sid), these problems have been fixed in
version 7u55-2.4.7-1.

We recommend that you upgrade your openjdk-7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=AfXK
-----END PGP SIGNATURE-----





[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux