[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 611-1] jsch security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : jsch
Version        : 0.1.42-2+deb7u1
CVE ID         : CVE-2016-5725

It was discovered that there was a path traversal vulnerability in jsch, a
pure Java implementation of the SSH2 protocol.

For Debian 7 "Wheezy", this issue has been fixed in jsch version
0.1.42-2+deb7u1.

We recommend that you upgrade your jsch packages.


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

-----BEGIN PGP SIGNATURE-----
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=2BTa
-----END PGP SIGNATURE-----


Reply to: