icedtea-web is vulnerable to authorization bypass attacks. The vulnerability exists as IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.
lists.fedoraproject.org/pipermail/package-announce/2015-September/167120.html
lists.fedoraproject.org/pipermail/package-announce/2015-September/167130.html
lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html
mail.openjdk.java.net/pipermail/distro-pkg-dev/2015-September/033546.html
rhn.redhat.com/errata/RHSA-2016-0778.html
www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
www.securitytracker.com/id/1033780
www.ubuntu.com/usn/USN-2817-1
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.8_Release_Notes/index.html
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.8_Technical_Notes/index.html
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1233667
bugzilla.redhat.com/show_bug.cgi?id=1299976
rhn.redhat.com/errata/RHSA-2016-0778.html