First published: Tue Jul 15 2014(Updated: )
It was discovered that the bytecode verification did not properly prevent ctor calls to this() and super() from certain code constructs. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update75 | |
Oracle JDK | =1.7.0-update60 | |
Oracle JDK | =1.8.0-update5 | |
Oracle JRE | =1.6.0-update75 | |
Oracle JRE | =1.7.0-update60 | |
Oracle JRE | =1.8.0-update5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.