Multiple vulnerabilities have been found in IcedTea, the worst of which may allow execution of arbitrary code.
|Package||dev-java/icedtea-bin on all architectures|
|Affected versions||< 22.214.171.124
|Unaffected versions||>= 126.96.36.199
IcedTea’s aim is to provide OpenJDK in a form suitable for easy configuration, compilation and distribution with the primary goal of allowing inclusion in GNU/Linux distributions.
Multiple vulnerabilities have been discovered in IcedTea. Please review the CVE identifiers referenced below for details.
Note: If the web browser plug-in provided by the dev-java/icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.
A remote attacker could possibly execute arbitrary code with the privileges of the process, gain access to information, or cause a Denial of Service condition.
There is no known workaround at this time.
All IcedTea binary 7.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-188.8.131.52:7"
All IcedTea binary 3.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-3.4.0:8"