what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3919-1

Debian Security Advisory 3919-1
Posted Jul 26, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3919-1 - Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in sandbox bypass, use of insecure cryptography, side channel attacks, information disclosure, the execution of arbitrary code, denial of service or bypassing Jar verification.

tags | advisory, java, denial of service, arbitrary, vulnerability, info disclosure
systems | linux, debian
advisories | CVE-2017-10053, CVE-2017-10067, CVE-2017-10074, CVE-2017-10078, CVE-2017-10081, CVE-2017-10087, CVE-2017-10089, CVE-2017-10090, CVE-2017-10096, CVE-2017-10101, CVE-2017-10102, CVE-2017-10107, CVE-2017-10108, CVE-2017-10109, CVE-2017-10110, CVE-2017-10111, CVE-2017-10115, CVE-2017-10116, CVE-2017-10118, CVE-2017-10135, CVE-2017-10176, CVE-2017-10193, CVE-2017-10198
SHA-256 | 642393b60460ab427f00a7f9230f96cea6919164c70db360fd2e9dbd9544bde0

Debian Security Advisory 3919-1

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3919-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 25, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openjdk-8
CVE ID : CVE-2017-10053 CVE-2017-10067 CVE-2017-10074
CVE-2017-10078 CVE-2017-10081 CVE-2017-10087
CVE-2017-10089 CVE-2017-10090 CVE-2017-10096
CVE-2017-10101 CVE-2017-10102 CVE-2017-10107
CVE-2017-10108 CVE-2017-10109 CVE-2017-10110
CVE-2017-10111 CVE-2017-10115 CVE-2017-10116
CVE-2017-10118 CVE-2017-10135 CVE-2017-10176
CVE-2017-10193 CVE-2017-10198

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in sandbox bypass,
use of insecure cryptography, side channel attacks, information
disclosure, the execution of arbitrary code, denial of service or
bypassing Jar verification.

For the stable distribution (stretch), these problems have been fixed in
version 8u141-b15-1~deb9u1.

For the unstable distribution (sid), these problems have been fixed in
version 8u141-b15-1.

We recommend that you upgrade your openjdk-8 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=/7uQ
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close