- Issued:
- 2016-04-20
- Updated:
- 2016-04-20
RHSA-2016:0650 - Critical: java-1.8.0-openjdk security update
Synopsis
Critical: java-1.8.0-openjdk security update
Type/Severity
Security Advisory Critical
Topic
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
-
Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687)
-
It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427)
-
It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425)
-
It was discovered that the GCM (Galois/Counter Mode) implementation in the JCE component in OpenJDK used a non-constant time comparison when comparing GCM authentication tags. A remote attacker could possibly use this flaw to determine the value of the authentication tag. (CVE-2016-3426)
-
It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695)
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of OpenJDK Java must be restarted for this update to take effect.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 7.7 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 7.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 7.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 7.3 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 7.2 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 7.7 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 7.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 7.5 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 7.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 7.3 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 7.2 | x86_64 |
| Red Hat Enterprise Linux for Scientific Computing | 7 | x86_64 |
| Red Hat Enterprise Linux for Power, little endian | 7 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 7.7 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 7.6 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 7.5 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 7.4 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 7.3 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 7.2 | ppc64le |
| Red Hat Enterprise Linux for Power, big endian | 7 | ppc64 |
| Red Hat Enterprise Linux for Power, big endian - Extended Update Support | 7.7 | ppc64 |
| Red Hat Enterprise Linux for Power, big endian - Extended Update Support | 7.6 | ppc64 |
| Red Hat Enterprise Linux for Power, big endian - Extended Update Support | 7.5 | ppc64 |
| Red Hat Enterprise Linux for Power, big endian - Extended Update Support | 7.4 | ppc64 |
| Red Hat Enterprise Linux for Power, big endian - Extended Update Support | 7.3 | ppc64 |
| Red Hat Enterprise Linux for Power, big endian - Extended Update Support | 7.2 | ppc64 |
| Red Hat Enterprise Linux for IBM z Systems | 7 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 7.7 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 7.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 7.5 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 7.4 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 7.3 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 7.2 | s390x |
| Red Hat Enterprise Linux Workstation | 7 | x86_64 |
| Red Hat Enterprise Linux Server | 7 | x86_64 |
| Red Hat Enterprise Linux Server from RHUI | 7 | x86_64 |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 7.7 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 7.6 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 7.4 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 7.3 | ppc64le |
| Red Hat Enterprise Linux Server - TUS | 7.7 | x86_64 |
| Red Hat Enterprise Linux Server - TUS | 7.6 | x86_64 |
| Red Hat Enterprise Linux Server - TUS | 7.3 | x86_64 |
| Red Hat Enterprise Linux Server - TUS | 7.2 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support | 7 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian | 7 | ppc64le |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian | 7 | ppc64 |
| Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) | 7 | s390x |
| Red Hat Enterprise Linux Server - AUS | 7.7 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 7.6 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 7.4 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 7.3 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 7.2 | x86_64 |
| Red Hat Enterprise Linux EUS Compute Node | 7.7 | x86_64 |
| Red Hat Enterprise Linux EUS Compute Node | 7.6 | x86_64 |
| Red Hat Enterprise Linux EUS Compute Node | 7.5 | x86_64 |
| Red Hat Enterprise Linux EUS Compute Node | 7.4 | x86_64 |
| Red Hat Enterprise Linux EUS Compute Node | 7.3 | x86_64 |
| Red Hat Enterprise Linux EUS Compute Node | 7.2 | x86_64 |
| Red Hat Enterprise Linux Desktop | 7 | x86_64 |
Updated Packages
- java-1.8.0-openjdk-debuginfo-1.8.0.91-0.b14.el7_2.s390x.rpm
- java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2.ppc64le.rpm
- java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2.s390x.rpm
- java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-accessibility-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2.ppc64.rpm
- java-1.8.0-openjdk-javadoc-debug-1.8.0.91-0.b14.el7_2.noarch.rpm
- java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2.s390x.rpm
- java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm
- java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2.s390x.rpm
- java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2.ppc64.rpm
- java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2.ppc64le.rpm
- java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2.ppc64.rpm
- java-1.8.0-openjdk-debuginfo-1.8.0.91-0.b14.el7_2.ppc64le.rpm
- java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.s390x.rpm
- java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2.s390x.rpm
- java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2.ppc64le.rpm
- java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2.s390x.rpm
- java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2.ppc64le.rpm
- java-1.8.0-openjdk-src-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.ppc64le.rpm
- java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2.ppc64.rpm
- java-1.8.0-openjdk-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.ppc64.rpm
- java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-javadoc-1.8.0.91-0.b14.el7_2.noarch.rpm
- java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2.ppc64.rpm
- java-1.8.0-openjdk-debuginfo-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-devel-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-demo-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-debuginfo-1.8.0.91-0.b14.el7_2.ppc64.rpm
- java-1.8.0-openjdk-headless-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm
- java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2.ppc64le.rpm
Fixes
- This content is not included.BZ - 1327743
- This content is not included.BZ - 1327749
- This content is not included.BZ - 1328022
- This content is not included.BZ - 1328040
- This content is not included.BZ - 1328059
- This content is not included.BZ - 1328210
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.