First published: Mon Apr 14 2014(Updated: )
It was discovered that the AWT toolkit did not properly handle the toolkit threads. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea | <1.13.3 | 1.13.3 |
redhat/icedtea | <2.4.7 | 2.4.7 |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
Oracle OpenJDK 1.8.0 | =1.5.0-update61 | |
Oracle OpenJDK 1.8.0 | =1.6.0-update71 | |
Oracle OpenJDK 1.8.0 | =1.7.0-update51 | |
Oracle OpenJDK 1.8.0 | =1.8.0 | |
Oracle JRE | =1.5.0-update61 | |
Oracle JRE | =1.6.0-update71 | |
Oracle JRE | =1.7.0-update51 | |
Oracle JRE | =1.8.0 | |
Debian | =6.0 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2412 is considered a high severity vulnerability due to its potential to bypass Java sandbox restrictions.
To fix CVE-2014-2412, update to the latest version of Oracle Java or the affected icedtea package as specified in the advisory.
CVE-2014-2412 affects Oracle Java SE versions 5.0u61, 6u71, 7u51, 8, and also Java SE Embedded 7u51.
Yes, untrusted Java applications or applets could exploit CVE-2014-2412 to bypass the Java sandbox restrictions.
CVE-2014-2412 impacts various platforms, including Red Hat, Ubuntu, and Debian distributions that utilize the affected Java packages.