{"id":"MGASA-2016-0048","summary":"Updated java-1.8.0-openjdk/copy-jdk-configs/lua-lunit/lua-posix packages fix security vulnerability","details":"An out-of-bounds write flaw was found in the JPEG image format decoder in\nthe AWT component in OpenJDK. A specially crafted JPEG image could cause\na Java application to crash or, possibly execute arbitrary code. An\nuntrusted Java application or applet could use this flaw to bypass Java\nsandbox restrictions (CVE-2016-0483).\n\nAn integer signedness issue was found in the font parsing code in the 2D\ncomponent in OpenJDK. A specially crafted font file could possibly cause\nthe Java Virtual Machine to execute arbitrary code, allowing an untrusted\nJava application or applet to bypass Java sandbox restrictions\n(CVE-2016-0494).\n\nIt was discovered that the password-based encryption (PBE) implementation\nin the Libraries component in OpenJDK used an incorrect key length. This\ncould, in certain cases, lead to generation of keys that were weaker than\nexpected (CVE-2016-0475).\n\nIt was discovered that the JAXP component in OpenJDK did not properly\nenforce the totalEntitySizeLimit limit. An attacker able to make a Java\napplication process a specially crafted XML file could use this flaw to\nmake the application consume an excessive amount of memory\n(CVE-2016-0466).\n\nA flaw was found in the way TLS 1.2 could use the MD5 hash function for\nsigning ServerKeyExchange and Client Authentication packets during a TLS\nhandshake. A man-in-the-middle attacker able to force a TLS connection to\nuse the MD5 hash function could use this flaw to conduct collision attacks\nto impersonate a TLS server or an authenticated TLS client\n(CVE-2015-7575).\n\nMultiple flaws were discovered in the Networking and JMX components in\nOpenJDK. An untrusted Java application or applet could use these flaws to\nbypass certain Java sandbox restrictions (CVE-2016-0402, CVE-2016-0448).\n\nThis update also required the addition of a new package, copy-jdk-configs,\nand a patch to the chkconfig package which adds the --family option to the\nalternatives command.  Both of these are used by scriplets in the update\njava-1.8.0-openjdk packages.\n","modified":"2026-04-16T01:47:59.428004290Z","published":"2016-02-05T17:26:09Z","upstream":["CVE-2015-7575","CVE-2016-0402","CVE-2016-0448","CVE-2016-0466","CVE-2016-0475","CVE-2016-0483","CVE-2016-0494"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0048.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=17576"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html#AppendixJAVA"},{"type":"WEB","url":"https://rhn.redhat.com/errata/RHSA-2016-0049.html"}],"affected":[{"package":{"name":"copy-jdk-configs","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/copy-jdk-configs?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1-1.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0048.json"}},{"package":{"name":"java-1.8.0-openjdk","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/java-1.8.0-openjdk?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.0.72-1.b15.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0048.json"}},{"package":{"name":"lua-lunit","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/lua-lunit?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.5-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0048.json"}},{"package":{"name":"lua-posix","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/lua-posix?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"33.3.1-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0048.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}