First published: Fri Apr 15 2016(Updated: )
It was discovered that the ObjectInputStream class in the Serialization component of OpenJDK failed to properly ensure thread consistency when deserializing serialized input. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1327743 is considered to be high due to the potential for untrusted applications to bypass Java sandbox restrictions.
To fix REDHAT-BUG-1327743, you should update to the latest patched version of OpenJDK provided by your vendor.
REDHAT-BUG-1327743 could allow malicious Java applications to escape sandbox environments, potentially leading to unauthorized system access.
Yes, REDHAT-BUG-1327743 affects certain versions of OpenJDK, so checking your specific version is crucial.
You can determine if your system is affected by REDHAT-BUG-1327743 by checking the OpenJDK version you are currently running.