First published: Tue Oct 20 2015(Updated: )
It was discovered that ICU Layout Engine was missing multiple boundary and error return checks. These could lead to buffer overflows and memory corruption. A specially crafted font file could cause an application using ICU to parse untrusted fonts to crash and, possibly, execute arbitrary code. ICU code is embedded the 2D component in OpenJDK and used by FontManager. An untrusted Java application or applet could use this flaw to execute arbitrary code with Java Virtual Machine privileges and bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.7.0-oracle-1:1.7.0.91-1jpp.1.el5_11 | 1.7.0-oracle-1:1.7.0.91-1jpp.1.el5_11 |
redhat/java | <1.6.0-sun-1:1.6.0.105-1jpp.2.el5_11 | 1.6.0-sun-1:1.6.0.105-1jpp.2.el5_11 |
redhat/java | <1.8.0-oracle-1:1.8.0.65-1jpp.3.el6_7 | 1.8.0-oracle-1:1.8.0.65-1jpp.3.el6_7 |
redhat/java | <1.7.0-oracle-1:1.7.0.91-1jpp.1.el6_7 | 1.7.0-oracle-1:1.7.0.91-1jpp.1.el6_7 |
redhat/java | <1.6.0-sun-1:1.6.0.105-1jpp.2.el6_7 | 1.6.0-sun-1:1.6.0.105-1jpp.2.el6_7 |
redhat/java | <1.8.0-oracle-1:1.8.0.65-1jpp.3.el7_1 | 1.8.0-oracle-1:1.8.0.65-1jpp.3.el7_1 |
redhat/java | <1.7.0-oracle-1:1.7.0.91-1jpp.1.el7_1 | 1.7.0-oracle-1:1.7.0.91-1jpp.1.el7_1 |
redhat/java | <1.6.0-sun-1:1.6.0.105-1jpp.2.el7_1 | 1.6.0-sun-1:1.6.0.105-1jpp.2.el7_1 |
redhat/java | <1.7.0-openjdk-1:1.7.0.91-2.6.2.1.el5_11 | 1.7.0-openjdk-1:1.7.0.91-2.6.2.1.el5_11 |
redhat/java | <1.6.0-openjdk-1:1.6.0.37-1.13.9.4.el5_11 | 1.6.0-openjdk-1:1.6.0.37-1.13.9.4.el5_11 |
redhat/java | <1.7.0-ibm-1:1.7.0.9.20-1jpp.1.el5 | 1.7.0-ibm-1:1.7.0.9.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-1:1.6.0.16.15-1jpp.1.el5 | 1.6.0-ibm-1:1.6.0.16.15-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-1:1.5.0.16.14-1jpp.1.el5 | 1.5.0-ibm-1:1.5.0.16.14-1jpp.1.el5 |
redhat/java | <1.8.0-openjdk-1:1.8.0.65-0.b17.el6_7 | 1.8.0-openjdk-1:1.8.0.65-0.b17.el6_7 |
redhat/java | <1.7.0-openjdk-1:1.7.0.91-2.6.2.2.el6_7 | 1.7.0-openjdk-1:1.7.0.91-2.6.2.2.el6_7 |
redhat/java | <1.6.0-openjdk-1:1.6.0.37-1.13.9.4.el6_7 | 1.6.0-openjdk-1:1.6.0.37-1.13.9.4.el6_7 |
redhat/java | <1.7.1-ibm-1:1.7.1.3.20-1jpp.1.el6_7 | 1.7.1-ibm-1:1.7.1.3.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-1:1.6.0.16.15-1jpp.1.el6_7 | 1.6.0-ibm-1:1.6.0.16.15-1jpp.1.el6_7 |
redhat/java | <1.5.0-ibm-1:1.5.0.16.14-1jpp.1.el6_7 | 1.5.0-ibm-1:1.5.0.16.14-1jpp.1.el6_7 |
redhat/java | <1.8.0-openjdk-1:1.8.0.65-2.b17.el7_1 | 1.8.0-openjdk-1:1.8.0.65-2.b17.el7_1 |
redhat/java | <1.7.0-openjdk-1:1.7.0.91-2.6.2.1.el7_1 | 1.7.0-openjdk-1:1.7.0.91-2.6.2.1.el7_1 |
redhat/java | <1.6.0-openjdk-1:1.6.0.37-1.13.9.4.el7_1 | 1.6.0-openjdk-1:1.6.0.37-1.13.9.4.el7_1 |
redhat/java | <1.7.1-ibm-1:1.7.1.3.20-1jpp.1.el7 | 1.7.1-ibm-1:1.7.1.3.20-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-1:1.8.0.2.0-1jpp.1.el7 | 1.8.0-ibm-1:1.8.0.2.0-1jpp.1.el7 |
redhat/java | <1.7.0-ibm-1:1.7.0.9.40-1jpp.1.el5 | 1.7.0-ibm-1:1.7.0.9.40-1jpp.1.el5 |
redhat/java | <1.7.1-ibm-1:1.7.1.3.40-1jpp.1.el6_7 | 1.7.1-ibm-1:1.7.1.3.40-1jpp.1.el6_7 |
redhat/spacewalk-java | <0:2.0.2-109.el6 | 0:2.0.2-109.el6 |
redhat/spacewalk-java | <0:2.3.8-146.el6 | 0:2.3.8-146.el6 |
Oracle JDK | =1.6.0-update101 | |
Oracle JDK | =1.7.0-update85 | |
Oracle JDK | =1.8.0-update51 | |
Oracle JDK | =1.8.0-update60 | |
Oracle JRE | =1.6.0-update_101 | |
Oracle JRE | =1.7.0-update_85 | |
Oracle JRE | =1.8.0-update_51 | |
Oracle JRE | =1.8.0-update_60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)