SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Java SE Vendors:   Oracle, Sun
(Oracle Issues Fix for Oracle Linux) Oracle Java SE Multiple Flaws Let Local and Remote Users Gain Elevated Privileges, Access and Modify Data, and Deny Service
SecurityTracker Alert ID:  1034784
SecurityTracker URL:  http://securitytracker.com/id/1034784
CVE Reference:   CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0475   (Links to External Site)
Date:  Jan 22 2016
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Oracle Java SE. A remote user can access and modify data on the target system. A remote user can cause denial of service conditions on the target system. A remote user can gain elevated privileges.

A remote user can exploit a flaw in the Java SE and Java SE Embedded 2D components to gain elevated privileges [CVE-2016-0494].

A remote user can exploit a flaw in the Java SE, Java SE Embedded, and JRockit AWT components to gain elevated privileges [CVE-2016-0483].

A remote user can exploit a flaw in the Java SE, Java SE Embedded, and JRockit Libraries components to partially access and partially modify data [CVE-2016-0475].

A remote user can exploit a flaw in the Java SE and Java SE Embedded Networking components to partially modify data [CVE-2016-0402].

A remote user can exploit a flaw in the Java SE, Java SE Embedded, and JRockit JAXP components to cause partial denial of service conditions [CVE-2016-0466].

A remote authenticated user can exploit a flaw in the Java SE and Java SE Embedded JMX components to partially access data [CVE-2016-0448].

The following researchers reported these and other Oracle product vulnerabilities:

Adam Willard of Raytheon Foreground Security; Alexey Tyurin of ERPScan; Andrea Micalizzi aka rgod (via HP's Zero Day Initiative); Anonymous (via HP's Zero Day Initiative); Brandon Vincent; Cybersecurity-upv; David Litchfield of Google;
Dmitry Janushkevich of Secunia Research; Fernando Russ of Onapsis; FortiGuard Labs of Fortinet, Inc.; Francois Goichon of Context Information Security; Igor Kopylenko of McAfee Database Security Research Team; Ivan Chalykin of ERPScan;
Jakub Palaczynski from ING Services Polska; Karthikeyan Bhargavan, Gaetan Leurent of INRIA; Lovi Yu of Salesforce.com; Luca Carettoni; Matias Mevied of Onapsis; Mike Arnold (Bruk0ut) (via HP's Zero Day Initiative); Nassim Bouali; Nicholas Lemonias of Advanced Information Security Corporation; Nikita Kelesis of ERPScan;
Peter Kostiuk of Salesforce.com; Ryan Giobbi of American Eagle Outfitters; Sergey Gorbaty of Salesforce.com; Shai Meir of McAfee Security Research; Spyridon Chatzimichail of COSMOTE - Mobile Telecommunications S.A.; Stefan Kanthak; Stephen Kost of Integrigy; Travis Emmert of Salesforce.com; and Will Dormann of CERT/CC.

Impact:   A remote user can obtain data on the target system.

A remote user can modify data on the target system.

A remote user can cause partial denial of service conditions.

A remote user can gain elevated privileges on the target system.

Solution:   Oracle has issued a fix for CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, and CVE-2016-0475 for java-1.8.0-openjdk.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2016-0050.html

Vendor URL:  linux.oracle.com/errata/ELSA-2016-0050.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Jan 19 2016 Oracle Java SE Multiple Flaws Let Local and Remote Users Gain Elevated Privileges, Access and Modify Data, and Deny Service



 Source Message Contents

Subject:  [El-errata] ELSA-2016-0050 Important: Oracle Linux 6 java-1.8.0-openjdk security update

Oracle Linux Security Advisory ELSA-2016-0050

http://linux.oracle.com/errata/ELSA-2016-0050.html

The following updated rpms for Oracle Linux 6 have been uploaded to the 
Unbreakable Linux Network:

i386:
java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.i686.rpm
java-1.8.0-openjdk-debug-1.8.0.71-1.b15.el6_7.i686.rpm
java-1.8.0-openjdk-demo-1.8.0.71-1.b15.el6_7.i686.rpm
java-1.8.0-openjdk-demo-debug-1.8.0.71-1.b15.el6_7.i686.rpm
java-1.8.0-openjdk-devel-1.8.0.71-1.b15.el6_7.i686.rpm
java-1.8.0-openjdk-devel-debug-1.8.0.71-1.b15.el6_7.i686.rpm
java-1.8.0-openjdk-headless-1.8.0.71-1.b15.el6_7.i686.rpm
java-1.8.0-openjdk-headless-debug-1.8.0.71-1.b15.el6_7.i686.rpm
java-1.8.0-openjdk-javadoc-1.8.0.71-1.b15.el6_7.noarch.rpm
java-1.8.0-openjdk-javadoc-debug-1.8.0.71-1.b15.el6_7.noarch.rpm
java-1.8.0-openjdk-src-1.8.0.71-1.b15.el6_7.i686.rpm
java-1.8.0-openjdk-src-debug-1.8.0.71-1.b15.el6_7.i686.rpm

x86_64:
java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.x86_64.rpm
java-1.8.0-openjdk-debug-1.8.0.71-1.b15.el6_7.x86_64.rpm
java-1.8.0-openjdk-demo-1.8.0.71-1.b15.el6_7.x86_64.rpm
java-1.8.0-openjdk-demo-debug-1.8.0.71-1.b15.el6_7.x86_64.rpm
java-1.8.0-openjdk-devel-1.8.0.71-1.b15.el6_7.x86_64.rpm
java-1.8.0-openjdk-devel-debug-1.8.0.71-1.b15.el6_7.x86_64.rpm
java-1.8.0-openjdk-headless-1.8.0.71-1.b15.el6_7.x86_64.rpm
java-1.8.0-openjdk-headless-debug-1.8.0.71-1.b15.el6_7.x86_64.rpm
java-1.8.0-openjdk-javadoc-1.8.0.71-1.b15.el6_7.noarch.rpm
java-1.8.0-openjdk-javadoc-debug-1.8.0.71-1.b15.el6_7.noarch.rpm
java-1.8.0-openjdk-src-1.8.0.71-1.b15.el6_7.x86_64.rpm
java-1.8.0-openjdk-src-debug-1.8.0.71-1.b15.el6_7.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.src.rpm



Description of changes:

[1:1.8.0.71-1.b15]
- Add patch to turn off strict overflow on 
IndicRearrangementProcessor{,2}.cpp
- Resolves: rhbz#1295751

[1:1.8.0.71-0.b15]
- January 2016 security update to u71b15.
- Improve verbosity and helpfulness of tarball generation script.
- Update patch documentation using version originally written for Fedora.
- Drop prelink requirement as we no longer use execstack.
- Drop ifdefbugfix patch as this is fixed upstream.
- Provide optional boostrap build and turn it off by default.
- Add patch for size_t formatting on s390 as size_t != intptr_t there.
- Resolves: rhbz#1295751

[1:1.8.0.65-4.b17]
- Add flag logic back to spec file but disable for now.
- Restore system-lcms.patch as used in October CPU.
- Resolves: rhbz#1295751

[1:1.8.0.65-3.b17]
- moved to integration forest
- sync with rhel7
- Resolves: rhbz#1295751



_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC