First published: Wed Oct 21 2015(Updated: )
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime<br>Environment and the OpenJDK 8 Java Software Development Kit.<br>Multiple flaws were discovered in the CORBA, Libraries, RMI, Serialization,<br>and 2D components in OpenJDK. An untrusted Java application or applet could<br>use these flaws to completely bypass Java sandbox restrictions.<br>(CVE-2015-4835, CVE-2015-4881, CVE-2015-4843, CVE-2015-4883, CVE-2015-4860,<br>CVE-2015-4805, CVE-2015-4844)<br>Multiple denial of service flaws were found in the JAXP component in<br>OpenJDK. A specially crafted XML file could cause a Java application using<br>JAXP to consume an excessive amount of CPU and memory when parsed.<br>(CVE-2015-4803, CVE-2015-4893, CVE-2015-4911)<br>A flaw was found in the way the Libraries component in OpenJDK handled<br>certificate revocation lists (CRL). In certain cases, CRL checking code<br>could fail to report a revoked certificate, causing the application to<br>accept it as trusted. (CVE-2015-4868)<br>It was discovered that the Security component in OpenJDK failed to properly<br>check if a certificate satisfied all defined constraints. In certain cases,<br>this could cause a Java application to accept an X.509 certificate which<br>does not meet requirements of the defined policy. (CVE-2015-4872)<br>Multiple flaws were found in the Libraries, 2D, CORBA, JAXP, JGSS, and RMI<br>components in OpenJDK. An untrusted Java application or applet could use<br>these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4806,<br>CVE-2015-4840, CVE-2015-4882, CVE-2015-4842, CVE-2015-4734, CVE-2015-4903)<br>Red Hat would like to thank Andrea Palazzo of Truel IT for reporting the<br>CVE-2015-4806 issue.<br>All users of java-1.8.0-openjdk are advised to upgrade to these updated<br>packages, which resolve these issues. All running instances of OpenJDK Java<br>must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.8.0-openjdk-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-debuginfo-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-debuginfo-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-debug-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-debug-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-debuginfo-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-debuginfo-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-demo-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-demo-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-demo-debug-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-demo-debug-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-devel-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-devel-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-devel-debug-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-devel-debug-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-headless-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-headless-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-headless-debug-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-headless-debug-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-javadoc-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-javadoc-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-javadoc-debug-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-javadoc-debug-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-src-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-src-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-src-debug-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-src-debug-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-debug-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-debug-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-debuginfo-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-debuginfo-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-demo-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-demo-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-demo-debug-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-demo-debug-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-devel-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-devel-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-devel-debug-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-devel-debug-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-headless-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-headless-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-headless-debug-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-headless-debug-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-src-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-src-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-src-debug-1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-src-debug-1.8.0.65-0.b17.el6_7 |
redhat/java | <1.8.0-openjdk-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-debuginfo-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-debuginfo-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 |
redhat/java | <1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2015:1919 addresses multiple flaws in the CORBA, Libraries, RMI, Serialization, and 2D components of OpenJDK.
The severity of RHSA-2015:1919 is classified as critical due to the potential for untrusted Java applications to exploit vulnerabilities.
To fix the vulnerabilities in RHSA-2015:1919, you should update to the specified remedial package versions for OpenJDK.
RHSA-2015:1919 affects various versions of OpenJDK 8, including those up to 1.8.0-openjdk-1.8.0.65-2.b17.el7_1.
RHSA-2015:1919 is applicable specifically to Red Hat Enterprise Linux environments running OpenJDK.