First published: Mon Oct 17 2016(Updated: )
It was discovered that the ClassLoaderWithRepository class in the JMX component of OpenJDK did not sufficiently perform classloader consistency checks, allowing classloader to return class with different name than requested. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6.0-update121 | |
Oracle JDK | =1.7.0-update111 | |
Oracle JDK | =1.8.0-update101 | |
Oracle JDK | =1.8.0-update102 | |
Oracle JRE | =1.6.0-update121 | |
Oracle JRE | =1.7.0-update111 | |
Oracle JRE | =1.8.0-update101 | |
Oracle JRE | =1.8.0-update102 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.