Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.122850
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2016-0050)
Summary:The remote host is missing an update for the 'java-1.8.0-openjdk' package(s) announced via the ELSA-2016-0050 advisory.
Description:Summary:
The remote host is missing an update for the 'java-1.8.0-openjdk' package(s) announced via the ELSA-2016-0050 advisory.

Vulnerability Insight:
[1:1.8.0.71-1.b15]
- Add patch to turn off strict overflow on IndicRearrangementProcessor{,2}.cpp
- Resolves: rhbz#1295751

[1:1.8.0.71-0.b15]
- January 2016 security update to u71b15.
- Improve verbosity and helpfulness of tarball generation script.
- Update patch documentation using version originally written for Fedora.
- Drop prelink requirement as we no longer use execstack.
- Drop ifdefbugfix patch as this is fixed upstream.
- Provide optional bootstrap build and turn it off by default.
- Add patch for size_t formatting on s390 as size_t != intptr_t there.
- Resolves: rhbz#1295751

[1:1.8.0.65-4.b17]
- Add flag logic back to spec file but disable for now.
- Restore system-lcms.patch as used in October CPU.
- Resolves: rhbz#1295751

[1:1.8.0.65-3.b17]
- moved to integration forest
- sync with rhel7
- Resolves: rhbz#1295751

Affected Software/OS:
'java-1.8.0-openjdk' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-7575
1034541
http://www.securitytracker.com/id/1034541
1036467
http://www.securitytracker.com/id/1036467
79684
http://www.securityfocus.com/bid/79684
91787
http://www.securityfocus.com/bid/91787
DSA-3436
http://www.debian.org/security/2016/dsa-3436
DSA-3437
http://www.debian.org/security/2016/dsa-3437
DSA-3457
http://www.debian.org/security/2016/dsa-3457
DSA-3458
http://www.debian.org/security/2016/dsa-3458
DSA-3465
http://www.debian.org/security/2016/dsa-3465
DSA-3491
http://www.debian.org/security/2016/dsa-3491
DSA-3688
http://www.debian.org/security/2016/dsa-3688
GLSA-201701-46
https://security.gentoo.org/glsa/201701-46
GLSA-201706-18
https://security.gentoo.org/glsa/201706-18
GLSA-201801-15
https://security.gentoo.org/glsa/201801-15
RHSA-2016:0049
http://rhn.redhat.com/errata/RHSA-2016-0049.html
RHSA-2016:0050
http://rhn.redhat.com/errata/RHSA-2016-0050.html
RHSA-2016:0053
http://rhn.redhat.com/errata/RHSA-2016-0053.html
RHSA-2016:0054
http://rhn.redhat.com/errata/RHSA-2016-0054.html
RHSA-2016:0055
http://rhn.redhat.com/errata/RHSA-2016-0055.html
RHSA-2016:0056
http://rhn.redhat.com/errata/RHSA-2016-0056.html
RHSA-2016:1430
https://access.redhat.com/errata/RHSA-2016:1430
SUSE-SU-2016:0256
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
SUSE-SU-2016:0265
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
SUSE-SU-2016:0269
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
USN-2863-1
http://www.ubuntu.com/usn/USN-2863-1
USN-2864-1
http://www.ubuntu.com/usn/USN-2864-1
USN-2865-1
http://www.ubuntu.com/usn/USN-2865-1
USN-2866-1
http://www.ubuntu.com/usn/USN-2866-1
USN-2884-1
http://www.ubuntu.com/usn/USN-2884-1
USN-2904-1
http://www.ubuntu.com/usn/USN-2904-1
http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
https://security.netapp.com/advisory/ntap-20160225-0001/
openSUSE-SU-2015:2405
http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
openSUSE-SU-2016:0007
http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
openSUSE-SU-2016:0161
http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
openSUSE-SU-2016:0162
http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
openSUSE-SU-2016:0263
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
openSUSE-SU-2016:0268
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
openSUSE-SU-2016:0270
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
openSUSE-SU-2016:0272
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
openSUSE-SU-2016:0279
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
openSUSE-SU-2016:0307
http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
openSUSE-SU-2016:0308
http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
openSUSE-SU-2016:0488
http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
openSUSE-SU-2016:0605
http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-0402
BugTraq ID: 81096
http://www.securityfocus.com/bid/81096
Debian Security Information: DSA-3458 (Google Search)
Debian Security Information: DSA-3465 (Google Search)
https://security.gentoo.org/glsa/201603-14
https://security.gentoo.org/glsa/201610-08
RedHat Security Advisories: RHSA-2016:0049
RedHat Security Advisories: RHSA-2016:0050
RedHat Security Advisories: RHSA-2016:0053
RedHat Security Advisories: RHSA-2016:0054
RedHat Security Advisories: RHSA-2016:0055
RedHat Security Advisories: RHSA-2016:0056
RedHat Security Advisories: RHSA-2016:0057
http://rhn.redhat.com/errata/RHSA-2016-0057.html
RedHat Security Advisories: RHSA-2016:0067
http://rhn.redhat.com/errata/RHSA-2016-0067.html
RedHat Security Advisories: RHSA-2016:1430
http://www.securitytracker.com/id/1034715
SuSE Security Announcement: SUSE-SU-2016:0256 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0265 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0269 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0263 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0268 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0270 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0272 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0279 (Google Search)
http://www.ubuntu.com/usn/USN-2885-1
Common Vulnerability Exposure (CVE) ID: CVE-2016-0448
BugTraq ID: 81123
http://www.securityfocus.com/bid/81123
Common Vulnerability Exposure (CVE) ID: CVE-2016-0466
BugTraq ID: 81118
http://www.securityfocus.com/bid/81118
Common Vulnerability Exposure (CVE) ID: CVE-2016-0475
Common Vulnerability Exposure (CVE) ID: CVE-2016-0483
http://www.zerodayinitiative.com/advisories/ZDI-16-032
Common Vulnerability Exposure (CVE) ID: CVE-2016-0494
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.