Advisory Published

RHSA-2016:0676: Critical: java-1.7.0-openjdk security update

First published: Thu Apr 21 2016(Updated: )

The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment<br>and the OpenJDK 7 Java Software Development Kit.<br>Security Fix(es):<br><li> Multiple flaws were discovered in the Serialization and Hotspot components in</li> OpenJDK. An untrusted Java application or applet could use these flaws to<br>completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687)<br><li> It was discovered that the RMI server implementation in the JMX component in</li> OpenJDK did not restrict which classes can be deserialized when deserializing<br>authentication credentials. A remote, unauthenticated attacker able to connect<br>to a JMX port could possibly use this flaw to trigger deserialization flaws.<br>(CVE-2016-3427)<br><li> It was discovered that the JAXP component in OpenJDK failed to properly handle</li> Unicode surrogate pairs used as part of the XML attribute values. Specially<br>crafted XML input could cause a Java application to use an excessive amount of<br>memory when parsed. (CVE-2016-3425)<br><li> It was discovered that the Security component in OpenJDK failed to check the</li> digest algorithm strength when generating DSA signatures. The use of a digest<br>weaker than the key strength could lead to the generation of signatures that<br>were weaker than expected. (CVE-2016-0695)<br>

Affected SoftwareAffected VersionHow to fix
redhat/java<1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-debuginfo-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-debuginfo-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-1.7.0.101-2.6.6.1.el5_11
1.7.0-openjdk-1.7.0.101-2.6.6.1.el5_11
redhat/java<1.7.0-openjdk-1.7.0.101-2.6.6.1.el5_11
1.7.0-openjdk-1.7.0.101-2.6.6.1.el5_11
redhat/java<1.7.0-openjdk-debuginfo-1.7.0.101-2.6.6.1.el5_11
1.7.0-openjdk-debuginfo-1.7.0.101-2.6.6.1.el5_11
redhat/java<1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el5_11
1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el5_11
redhat/java<1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el5_11
1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el5_11
redhat/java<1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el5_11
1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el5_11
redhat/java<1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el5_11
1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el5_11
redhat/java<1.7.0-openjdk-debuginfo-1.7.0.101-2.6.6.1.el5_11
1.7.0-openjdk-debuginfo-1.7.0.101-2.6.6.1.el5_11
redhat/java<1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el5_11
1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el5_11
redhat/java<1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el5_11
1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el5_11
redhat/java<1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el5_11
1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el5_11
redhat/java<1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el5_11
1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el5_11
redhat/java<1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-debuginfo-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-debuginfo-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-debuginfo-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-debuginfo-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2
redhat/java<1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2
1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203