CVE-2016-3426 Affecting openjdk-8 package, versions <8u91-b14-1
Threat Intelligence
EPSS
0.69% (81st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-OPENJDK8-384120
- published 21 Apr 2016
- disclosed 21 Apr 2016
Introduced: 21 Apr 2016
CVE-2016-3426 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
openjdk-8
to version 8u91-b14-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream openjdk-8
package and not the openjdk-8
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality via vectors related to JCE.
References
- https://security-tracker.debian.org/tracker/CVE-2016-3426
- http://www.debian.org/security/2016/dsa-3558
- https://security.gentoo.org/glsa/201610-08
- https://security.netapp.com/advisory/ntap-20160420-0001/
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://rhn.redhat.com/errata/RHSA-2016-0650.html
- http://rhn.redhat.com/errata/RHSA-2016-0651.html
- http://rhn.redhat.com/errata/RHSA-2016-0677.html
- http://rhn.redhat.com/errata/RHSA-2016-0701.html
- http://rhn.redhat.com/errata/RHSA-2016-0702.html
- http://rhn.redhat.com/errata/RHSA-2016-0708.html
- http://rhn.redhat.com/errata/RHSA-2016-0716.html
- http://rhn.redhat.com/errata/RHSA-2016-1039.html
- https://access.redhat.com/errata/RHSA-2016:1430
- https://access.redhat.com/errata/RHSA-2017:1216
- http://www.securityfocus.com/bid/86449
- http://www.securitytracker.com/id/1035596
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-3426
- http://www.ubuntu.com/usn/USN-2963-1
CVSS Scores
version 3.1