Lucene search

K
centosCentOS ProjectCESA-2016:1776
HistoryAug 26, 2016 - 2:36 p.m.

java security update

2016-08-2614:36:52
CentOS Project
lists.centos.org
55

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.012 Low

EPSS

Percentile

85.3%

CentOS Errata and Security Advisory CESA-2016:1776

The java-1.6.0-openjdk packages provide the OpenJDK 6 Java Runtime Environment
and the OpenJDK 6 Java Software Development Kit.

Security Fix(es):

  • An insufficient bytecode verification flaw was discovered in the Hotspot
    component in OpenJDK. An untrusted Java application or applet could use this
    flaw to completely bypass Java sandbox restrictions. (CVE-2016-3606)

  • Multiple denial of service flaws were found in the JAXP component in OpenJDK.
    A specially crafted XML file could cause a Java application using JAXP to
    consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500,
    CVE-2016-3508)

  • Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An
    untrusted Java application or applet could use these flaws to bypass certain
    Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550)

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2016-August/084216.html
https://lists.centos.org/pipermail/centos-announce/2016-August/084217.html
https://lists.centos.org/pipermail/centos-announce/2016-August/084218.html

Affected packages:
java-1.6.0-openjdk
java-1.6.0-openjdk-demo
java-1.6.0-openjdk-devel
java-1.6.0-openjdk-javadoc
java-1.6.0-openjdk-src

Upstream details at:
https://access.redhat.com/errata/RHSA-2016:1776

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.012 Low

EPSS

Percentile

85.3%