First published: Mon Jul 13 2015(Updated: )
An integer overflow flaw, leading to out-of-bounds read, was found in the LETableReference's verifyLength() method. A specially crafted file could cause an application using ICU to parse untrusted font files to perform an invalid memory access, leading to crash and possibly disclosure of portion of application memory. ICU code is embedded the 2D component in OpenJDK and used by FontManager. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update95 | |
Oracle JDK | =1.7.0-update80 | |
Oracle JDK | =1.8.0-update45 | |
Oracle JRE | =1.6.0-update_95 | |
Oracle JRE | =1.7.0-update_80 | |
Oracle JRE | =1.8.0-update_45 | |
debian/icu | 67.1-7 72.1-3 72.1-5 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Oracle Java SE vulnerability is CVE-2015-2632.
Oracle Java SE 6u95, 7u80, and 8u45 are affected by this vulnerability.
This vulnerability can affect confidentiality through unknown vectors related to 2D.
The severity level of this vulnerability is medium.
You can find more information about this vulnerability at the following references: [Oracle](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA), [Red Hat](https://rhn.redhat.com/errata/RHSA-2015-1230.html), [Red Hat](https://rhn.redhat.com/errata/RHSA-2015-1229.html).