—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
– ————————————————————————-
Debian Security Advisory DSA-3840-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 02, 2017 https://www.debian.org/security/faq
– ————————————————————————-
Package : mysql-connector-java
CVE ID : CVE-2017-3523
Thijs Alkemade discovered that unexpected automatic deserialisation of
Java objects in the MySQL Connector/J JDBC driver may result in the
execution of arbitary code. For additional details, please refer to the
advisory at
https://www.computest.nl/advisories/CT-2017-0425_MySQL-Connector-J.txt
For the stable distribution (jessie), this problem has been fixed in
version 5.1.41-1~deb8u1.
For the upcoming stable distribution (stretch), this problem has been
fixed in version 5.1.41-1.
For the unstable distribution (sid), this problem has been fixed in
version 5.1.41-1.
We recommend that you upgrade your mysql-connector-java packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=TCub
—–END PGP SIGNATURE—–