Debian 10225 Published by

The following two security updates for Debian has been released:

[DSA 2979-1] fail2ban security update
[DSA 2980-1] openjdk-6 security update



[DSA 2979-1] fail2ban security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2979-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
July 17, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : fail2ban
CVE ID : CVE-2013-7176 CVE-2013-7177

Two vulnerabilities were discovered in Fail2ban, a solution to ban hosts
that cause multiple authentication errors. When using Fail2ban to monitor
Postfix or Cyrus IMAP logs, improper input validation in log parsing
could enable a remote attacker to trigger an IP ban on arbitrary
addresses, resulting in denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 0.8.6-3wheezy3.

For the testing distribution (jessie), these problems have been fixed in
version 0.8.11-1.

For the unstable distribution (sid), these problems have been fixed in
version 0.8.11-1.

We recommend that you upgrade your fail2ban packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

[DSA 2980-1] openjdk-6 security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2980-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
July 17, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openjdk-6
CVE ID : CVE-2014-2490 CVE-2014-4209 CVE-2014-4216 CVE-2014-4218
CVE-2014-4219 CVE-2014-4244 CVE-2014-4252 CVE-2014-4262
CVE-2014-4263 CVE-2014-4266 CVE-2014-4268

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in the execution
of arbitrary code, breakouts of the Java sandbox, information disclosure
or denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 6b32-1.13.4-1~deb7u1.

We recommend that you upgrade your openjdk-6 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/