Out-of-bounds Read Affecting java-1.8.0-openjdk-accessibility package, versions <1:1.8.0.65-2.b17.el7_1
Threat Intelligence
EPSS
0.79% (82nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-JAVA180OPENJDKACCESSIBILITY-2051641
- published 26 Jul 2021
- disclosed 20 Oct 2015
Introduced: 20 Oct 2015
CVE-2015-4840 Open this link in a new tabHow to fix?
Upgrade Centos:7
java-1.8.0-openjdk-accessibility
to version 1:1.8.0.65-2.b17.el7_1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-accessibility
package and not the java-1.8.0-openjdk-accessibility
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via unknown vectors related to 2D.
References
- http://www.securityfocus.com/bid/77242
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- https://access.redhat.com/security/cve/CVE-2015-4840
- http://www.debian.org/security/2015/dsa-3381
- https://security.gentoo.org/glsa/201603-11
- https://security.gentoo.org/glsa/201603-14
- http://rhn.redhat.com/errata/RHSA-2015-1919.html
- http://rhn.redhat.com/errata/RHSA-2015-1920.html
- http://rhn.redhat.com/errata/RHSA-2015-1921.html
- http://rhn.redhat.com/errata/RHSA-2015-1926.html
- http://rhn.redhat.com/errata/RHSA-2015-1927.html
- http://rhn.redhat.com/errata/RHSA-2015-2506.html
- http://rhn.redhat.com/errata/RHSA-2015-2507.html
- http://rhn.redhat.com/errata/RHSA-2015-2509.html
- https://access.redhat.com/errata/RHSA-2015:1919
- http://www.securitytracker.com/id/1033884
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
- http://www.ubuntu.com/usn/USN-2784-1
CVSS Scores
version 3.1