{"id":"MGASA-2016-0130","summary":"Updated java packages fix CVE-2016-0636","details":"Updated java-1.8.0-openjdk packages fix security vulnerability:\n\nAn improper type safety check was discovered in the Hotspot component. An\nuntrusted Java application or applet could use this flaw to bypass Java\nSandbox restrictions (CVE-2016-0636).\n\nAlso, the icedtea-web package has been updated to version 1.6.2 to fix all\nknown issues in the Java browser plugin.\n","modified":"2026-04-16T06:22:28.384470835Z","published":"2016-04-06T14:09:53Z","upstream":["CVE-2016-0636"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0130.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=18069"},{"type":"WEB","url":"http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2016-February/034831.html"},{"type":"WEB","url":"https://rhn.redhat.com/errata/RHSA-2016-0513.html"}],"affected":[{"package":{"name":"java-1.8.0-openjdk","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/java-1.8.0-openjdk?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.0.77-1.b03.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0130.json"}},{"package":{"name":"icedtea-web","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/icedtea-web?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.2-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0130.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}