First published: Mon Apr 14 2014(Updated: )
It was discovered that the System.arraycopy() method has a race condition between verifying source elements and storing them. An untrusted Java application or applet could possibly use this flaw to trigger a Java Virtual Machine memory corruption.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <1.13.3 | 1.13.3 |
redhat/icedtea | <2.4.7 | 2.4.7 |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 | |
Ubuntu Linux | =14.04 | |
BEA JRockit | =r27.8.1 | |
BEA JRockit | =r28.3.1 | |
Juniper Networks Junos Space | <15.1 | |
Oracle JDK 6 | =1.5.0-update61 | |
Oracle JDK 6 | =1.6.0-update71 | |
Oracle JDK 6 | =1.7.0-update51 | |
Oracle JDK 6 | =1.8.0 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update61 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update71 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update51 | |
Oracle Java Runtime Environment (JRE) | =1.8.0 | |
Debian GNU/Linux | =6.0 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
IBM Forms Viewer | >=4.0.0<4.0.0.3 | |
IBM Forms Viewer | >=8.0.0<8.0.1.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-0456 is considered high due to potential memory corruption risks in Java applications.
To fix CVE-2014-0456, update your Java Runtime Environment to the latest available patch that addresses this vulnerability.
CVE-2014-0456 affects various versions of Oracle Java SE, JRockit, and multiple distributions of Linux such as Ubuntu and Debian.
Yes, untrusted Java applications or applets can exploit CVE-2014-0456 to potentially trigger memory corruption.
Yes, CVE-2014-0456 is highly relevant for users of the Java Runtime Environment as it poses security risks that can be exploited.