CVE-2016-3426 Affecting java-1.8.0-openjdk-accessibility package, versions <1:1.8.0.91-0.b14.el7_2
Threat Intelligence
EPSS
0.69% (81st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-JAVA180OPENJDKACCESSIBILITY-2064423
- published 26 Jul 2021
- disclosed 19 Apr 2016
Introduced: 19 Apr 2016
CVE-2016-3426 Open this link in a new tabHow to fix?
Upgrade Centos:7
java-1.8.0-openjdk-accessibility
to version 1:1.8.0.91-0.b14.el7_2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream java-1.8.0-openjdk-accessibility
package and not the java-1.8.0-openjdk-accessibility
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality via vectors related to JCE.
References
- http://www.securityfocus.com/bid/86449
- https://security.netapp.com/advisory/ntap-20160420-0001/
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://access.redhat.com/security/cve/CVE-2016-3426
- http://www.debian.org/security/2016/dsa-3558
- https://security.gentoo.org/glsa/201610-08
- http://rhn.redhat.com/errata/RHSA-2016-0650.html
- http://rhn.redhat.com/errata/RHSA-2016-0651.html
- http://rhn.redhat.com/errata/RHSA-2016-0677.html
- http://rhn.redhat.com/errata/RHSA-2016-0701.html
- http://rhn.redhat.com/errata/RHSA-2016-0702.html
- http://rhn.redhat.com/errata/RHSA-2016-0708.html
- http://rhn.redhat.com/errata/RHSA-2016-0716.html
- http://rhn.redhat.com/errata/RHSA-2016-1039.html
- https://access.redhat.com/errata/RHSA-2016:0650
- http://www.securitytracker.com/id/1035596
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
- http://www.ubuntu.com/usn/USN-2963-1
CVSS Scores
version 3.1