-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1025
                         openjdk-7 security update
                               27 April 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           openjdk-7
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Privileged Data          -- Remote/Unauthenticated
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Reduced Security                -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-3427 CVE-2016-3426 CVE-2016-3425
                   CVE-2016-0695 CVE-2016-0687 CVE-2016-0686
                   CVE-2016-0636  

Reference:         ASB-2016.0043
                   ESB-2016.1012
                   ESB-2016.1011
                   ESB-2016.1010
                   ESB-2016.1009
                   ESB-2016.1002
                   ESB-2016.0863
                   ESB-2016.0791
                   ESB-2016.0790
                   ESB-2016.0789

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3558

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3558-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
April 26, 2016                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : openjdk-7
CVE ID         : CVE-2016-0636 CVE-2016-0686 CVE-2016-0687 CVE-2016-0695 
                 CVE-2016-3425 CVE-2016-3426 CVE-2016-3427

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in breakouts of
the Java sandbox, denial of service or information disclosure.

For the stable distribution (jessie), these problems have been fixed in
version 7u101-2.6.6-1~deb8u1.

We recommend that you upgrade your openjdk-7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBCAAGBQJXH837AAoJEBDCk7bDfE42T0QP+QGxR+OgBILJHNJTKzZEaCH0
vVuYoMqnPOJAauIxkeT42iDd9r3lIIYDtwM1QmGYAcJpC+i70qwXdufFNOJoXZ+q
nd57UdI2ggnzHkCwqzqQt7BFgOJ+o0VqXuXuezWErdHAIoTN8H0uE9vQJ4Le0ASj
VmKAzNO49ZMhDxrXOTDRFEZCEF2c2+cQ4y5w7Jfs1m1KxWpkQ9MlbQrXtJJYHR2d
opvW9ifTLpND9lAir2TD0oB826g9kY2HySc90e6GxK7Y8l9n2l2eUNYcka2b4DXb
wu/xCrvdB5B4czDXzMJGbo59upsh9u4DOTZpt2I2oWgxDR6wodNHCla4ExfGokOg
TJmO6PYSNuzUQNkXqt7SfME09DfoMBLFSvZ1Rj58whM4XaT15MRkHFXtW/qQPD3i
jOGVVRFn9o0961o6QXe+GrMd6/GfOX9/iK7wapH9Zozpd8Tftp73ZvDsxZseH+vF
lrT8oI7cdLO5vqHeFTahcz0wIVsTFpC6unHW/0ivcBSy58G90BYC3qEU3UebAkfd
6h0GNfC9x5xL2vmHHKYgdgRqrmdUdJlgS5s2ay4SE4cLXoaFOBgT7OK76VDobkYO
TAmvUGrFCeMuNKc1l5p+nLCG5F3RnogDONNXjWSwlM6NSjIm/C6YLoAYYXJrjYXB
G699bO+MYk5QquS65HJx
=Rabo
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVyAVfn6ZAP0PgtI9AQLmoA//dkgzSbZkxzGwU34amgFeTzZXOE9QAMWa
rdU3itHm9MG6/P0xzn92U4eVHgqNzatzng1iGElS8dSZECKXwrEqH8DvKye+8OmR
MYSRjCWfa3CMzj/JNJfHrOqbyXT9a/v4fXy2iF3LFGwBVj6pLrVMENN/j7p0YUTD
CutebX73/wz9NK5KuLX+z9dSMlf7Z9AvTJsSBjw7bOiFG2+gApAvkP4HCzEYB0aY
HGs6dew3KiZD8bY5wNpqs69ROcDyXUh7SIXVlMiHyp2OhctR2WRFn/sGhyeF7iSa
yb/EVqQWkO/S9b+Z+V39+oqPIdeC8qDxX6dESUtwQReJsHjo1NgMfWVj2S1j12TA
BM3cbtu4eoUX18oaCIHvqIPKae2ppeQHk4drAL+SgljeHd4UjrPjliCX1Le0Jys0
rTsgxDhLbIHBWYBom2Yz/dDyA3BheWQ6hCjyE8RbO5L6XrEIyLBSj4DeJ4SKPGKR
J1XRzqTtAj7ZKeUUJ4+ty03BECkltwegoWiJSW0+HUhmCHUxi9R5UHXc/Dq6YA2u
SufS90Vm8+KEyzdZS8WErq7oVLx0T8+V2oFVphSJbA9YIzKDJDcZQ/hU9ew+QDzc
bDWQWOyPixP2KegG0Nnfwi24v3ZG/Dt09jmMJsiSZNiW17IAFug3bnZVmgNFpucU
wgi0jOBTBrY=
=K57h
-----END PGP SIGNATURE-----