First published: Tue Oct 16 2018(Updated: )
It was discovered that the Security component of OpenJDK could incorrectly use unsigned manifest attribute entries when only properly signed entries were meant to be used. This could lead to bypass of protections provided by Jar signing. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1639755 is considered high due to its potential to bypass Jar signing protections.
To fix REDHAT-BUG-1639755, you should update OpenJDK to the latest version provided by your distribution.
REDHAT-BUG-1639755 allows untrusted Java applications to potentially execute unauthorized code by bypassing security checks.
REDHAT-BUG-1639755 was first reported as a vulnerability in 2018.
REDHAT-BUG-1639755 affects specific versions of OpenJDK, so checking your version against security advisories is crucial.