drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in Jython
Name: |
Ausführen beliebiger Kommandos in Jython |
|
ID: |
DSA-3893-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian jessie, Debian stretch |
|
Datum: |
Do, 22. Juni 2017, 15:26 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4000 |
|
Applikationen: |
Jython |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3893-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso June 22, 2017 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : jython CVE ID : CVE-2016-4000 Debian Bug : 864859
Alvaro Munoz and Christian Schneider discovered that jython, an implementation of the Python language seamlessly integrated with Java, is prone to arbitrary code execution triggered when sending a serialized function to the deserializer.
For the oldstable distribution (jessie), this problem has been fixed in version 2.5.3-3+deb8u1.
For the stable distribution (stretch), this problem has been fixed in version 2.5.3-16+deb9u1.
For the unstable distribution (sid), this problem has been fixed in version 2.5.3-17.
We recommend that you upgrade your jython packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAllLudlfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0ToGw/+MK3U6RBkBbh3sv9fNxgY9Ou+yj7dSeUhN4P8511145goAHgM0PvSI/Ml PsPgOZDrnnymc8GYn2bGXWqVcWgqrXnIvycz1J8orvLnJfPb13ww3t+XlKs/Vrrv Prj6ROiC0cmbNeKbuR+ly2qaysYcippl5SmpnhOEbJkXf8fsBYqIWo+WThAIE2NO 0X2CPP3iiS3N0NLHmEUBicXd0osZGkTrDznSCJ/mi7RaY30WISJbkuUoepILg+Qi c9b2ZEkOGn9MxBfh8dAeY2j/hpUXGIWVZrmBE7t9ertMQ7wc2JS/Tmgiy/kAttFB D2CiQQ0laZfJFUXyTr00i+t80A4RamsIfnvMZ1fly4IjJnVaRw7M9umlw0dnQmBd hbLwDIOZnHSU0e5pBLMT6a62ENivyY8SoOmHC0lNyTAIHqHzKO9IOUx9taNuFiUM kEaE/9qTYNuUS4JstMZ04lonvx06pjg5oMd4JyMJrav5wq7xes7bLGVTgaKzUgxb nJwpSFyQhLJmz5XhjD4O/gMS1PdFHvoxTJeOfrB7E/kMSQnkT6+gvZGUb17n51Bo FB+k92EDlcsSRjYFPcxQmNw/H8pRjpMLTMQN07bltU2ZnILm212wrDsccw/qk960 SW7QsVoWzFuxVsk36xArq/96h5Y7lW4wHgUlw5H5g/F2KQvEeZ8= =3zEd -----END PGP SIGNATURE-----
|
|
|
|