exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 2923-1

Debian Security Advisory 2923-1
Posted May 6, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2923-1 - Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, breakouts of the Java sandbox, information disclosure or denial of service.

tags | advisory, java, denial of service, arbitrary, vulnerability, info disclosure
systems | linux, debian
advisories | CVE-2013-6629, CVE-2013-6954, CVE-2014-0429, CVE-2014-0446, CVE-2014-0451, CVE-2014-0452, CVE-2014-0453, CVE-2014-0454, CVE-2014-0455, CVE-2014-0456, CVE-2014-0457, CVE-2014-0458, CVE-2014-0459, CVE-2014-0460, CVE-2014-0461, CVE-2014-1876, CVE-2014-2397, CVE-2014-2398, CVE-2014-2402, CVE-2014-2403, CVE-2014-2412, CVE-2014-2413, CVE-2014-2414, CVE-2014-2421, CVE-2014-2423, CVE-2014-2427
SHA-256 | 41db98129c7ced616079f72d5a8c232d6ab7d4a478b44de3842882ebf72fd54f

Debian Security Advisory 2923-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2923-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
May 05, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openjdk-7
CVE ID : CVE-2013-6629 CVE-2013-6954 CVE-2014-0429 CVE-2014-0446
CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0454
CVE-2014-0455 CVE-2014-0456 CVE-2014-0457 CVE-2014-0458
CVE-2014-0459 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876
CVE-2014-2397 CVE-2014-2398 CVE-2014-2402 CVE-2014-2403
CVE-2014-2412 CVE-2014-2413 CVE-2014-2414 CVE-2014-2421
CVE-2014-2423 CVE-2014-2427

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in the execution
of arbitrary code, breakouts of the Java sandbox, information disclosure
or denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 7u55-2.4.7-1~deb7u1.

For the unstable distribution (sid), these problems have been fixed in
version 7u55-2.4.7-1.

We recommend that you upgrade your openjdk-7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJTZ6HoAAoJEBDCk7bDfE42AMQP/1QnMmcQoIS6ZsHtqnXgrPPx
fbHlqCZZ2silTQbq8QGtkW3mUFJxOjQ4CykpBeY9Yxk+7O4H8A2vWDJpptGsCu2v
oQ/8G4By2OxfoDt5Oc7WWpO9gb2sjMmohjwwv56fUk+jvnPAYL7nA4Z80HqPRJk2
8zTJCM6SD5QzalVpcYFiQOvs0H/Tgy3Qx3lXalAdsUPL8cpdq8adT58cYZPn/qRi
9PgyF3LrteUNobYNhyruUGuQjNjVpuyGcDNlBhzeAEx2/psBBtSOkAbS2M7s5JPC
iyLZe6Rnlg1MD2/Txt7nNbRKurJA50/mIjPzApSHcbmMzDgMm8pORuJ3NLxU1yi/
QxYgjvnHOTssspdFOgX5RSnTcXurNLzYli/UsmjcpXNNt4cVufoUl431QhndOMrJ
ywvF/9kjgQ4t75gTDPM3HVlc/h9DLl009Tx9YHLXUoUu0wQL+GG9n39sHkxcRvOa
Y47oIbYsapuH1Z6QG9tUuCXNaAhowT0Wl/1vvtEbxbzI2SBEijDAMDD7WQlJcim4
MdDi7eS+x8RGx30Pbf9QnediK+jAjFxUw1jhBSzva/RNTdode0GOsMiEvZHQ8tOk
rXDMYX2dtJs0miLXVJ5DD1JYwZNPSUSFmiheMOw5YOQDU6+PMPf7ISNOYbhkNjNK
sSXL8ac4JI3rYYHpkht5
=AfXK
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close