First published: Tue Apr 16 2013(Updated: )
It was discovered that the ConcurrentHashMap class incorrectly calls the defaultReadObject() method. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JRE | <=1.7.0 | |
Oracle JRE | =1.7.0 | |
Oracle JRE | =1.7.0-update1 | |
Oracle JRE | =1.7.0-update10 | |
Oracle JRE | =1.7.0-update11 | |
Oracle JRE | =1.7.0-update13 | |
Oracle JRE | =1.7.0-update15 | |
Oracle JRE | =1.7.0-update2 | |
Oracle JRE | =1.7.0-update3 | |
Oracle JRE | =1.7.0-update4 | |
Oracle JRE | =1.7.0-update5 | |
Oracle JRE | =1.7.0-update6 | |
Oracle JRE | =1.7.0-update7 | |
Oracle JRE | =1.7.0-update9 | |
Oracle JDK | <=1.7.0 | |
Oracle JDK | =1.7.0 | |
Oracle JDK | =1.7.0-update1 | |
Oracle JDK | =1.7.0-update10 | |
Oracle JDK | =1.7.0-update11 | |
Oracle JDK | =1.7.0-update13 | |
Oracle JDK | =1.7.0-update15 | |
Oracle JDK | =1.7.0-update2 | |
Oracle JDK | =1.7.0-update3 | |
Oracle JDK | =1.7.0-update4 | |
Oracle JDK | =1.7.0-update5 | |
Oracle JDK | =1.7.0-update6 | |
Oracle JDK | =1.7.0-update7 | |
Oracle JDK | =1.7.0-update9 | |
redhat/icedtea6 | <1.11.10 | 1.11.10 |
redhat/icedtea6 | <1.12.5 | 1.12.5 |
redhat/icedtea7 | <2.3.9 | 2.3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.