It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
{ "binaries": [ { "binary_version": "1.6.2-3ubuntu1", "binary_name": "icedtea-8-plugin" }, { "binary_version": "1.6.2-3ubuntu1", "binary_name": "icedtea-netx" }, { "binary_version": "1.6.2-3ubuntu1", "binary_name": "icedtea-netx-common" }, { "binary_version": "1.6.2-3ubuntu1", "binary_name": "icedtea-plugin" } ] }
{ "binaries": [ { "binary_version": "1.8-0ubuntu8~18.04", "binary_name": "icedtea-8-plugin" }, { "binary_version": "1.8-0ubuntu8~18.04", "binary_name": "icedtea-netx" }, { "binary_version": "1.8-0ubuntu8~18.04", "binary_name": "icedtea-netx-common" }, { "binary_version": "1.8-0ubuntu8~18.04", "binary_name": "icedtea-plugin" } ] }