Print

Print


Synopsis:          Critical: java-1.8.0-openjdk security update
Advisory ID:       SLSA-2016:0650-1
Issue Date:        2016-04-20
CVE Numbers:       CVE-2016-0686
                   CVE-2016-0687
                   CVE-2016-0695
                   CVE-2016-3425
                   CVE-2016-3426
                   CVE-2016-3427
--

Security Fix(es):

* Multiple flaws were discovered in the Serialization and Hotspot
components in OpenJDK. An untrusted Java application or applet could use
these flaws to completely bypass Java sandbox restrictions.
(CVE-2016-0686, CVE-2016-0687)

* It was discovered that the RMI server implementation in the JMX
component in OpenJDK did not restrict which classes can be deserialized
when deserializing authentication credentials. A remote, unauthenticated
attacker able to connect to a JMX port could possibly use this flaw to
trigger deserialization flaws. (CVE-2016-3427)

* It was discovered that the JAXP component in OpenJDK failed to properly
handle Unicode surrogate pairs used as part of the XML attribute values.
Specially crafted XML input could cause a Java application to use an
excessive amount of memory when parsed. (CVE-2016-3425)

* It was discovered that the GCM (Galois/Counter Mode) implementation in
the JCE component in OpenJDK used a non-constant time comparison when
comparing GCM authentication tags. A remote attacker could possibly use
this flaw to determine the value of the authentication tag.
(CVE-2016-3426)

* It was discovered that the Security component in OpenJDK failed to check
the digest algorithm strength when generating DSA signatures. The use of a
digest weaker than the key strength could lead to the generation of
signatures that were weaker than expected. (CVE-2016-0695)

Note: If the web browser plug-in provided by the icedtea-web package was
installed, the issues exposed via Java applets could have been exploited
without user interaction if a user visited a malicious website.
--

SL7
  x86_64
    java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.x86_64.rpm
    java-1.8.0-openjdk-debuginfo-1.8.0.91-0.b14.el7_2.x86_64.rpm
    java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2.x86_64.rpm
    java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2.x86_64.rpm
    java-1.8.0-openjdk-accessibility-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm
    java-1.8.0-openjdk-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm
    java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2.x86_64.rpm
    java-1.8.0-openjdk-demo-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm
    java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2.x86_64.rpm
    java-1.8.0-openjdk-devel-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm
    java-1.8.0-openjdk-headless-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm
    java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2.x86_64.rpm
    java-1.8.0-openjdk-src-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm
  noarch
    java-1.8.0-openjdk-javadoc-1.8.0.91-0.b14.el7_2.noarch.rpm
    java-1.8.0-openjdk-javadoc-debug-1.8.0.91-0.b14.el7_2.noarch.rpm

- Scientific Linux Development Team