It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
{ "binaries": [ { "binary_name": "icedtea-8-plugin", "binary_version": "1.6.2-3ubuntu1" }, { "binary_name": "icedtea-netx", "binary_version": "1.6.2-3ubuntu1" }, { "binary_name": "icedtea-netx-common", "binary_version": "1.6.2-3ubuntu1" }, { "binary_name": "icedtea-plugin", "binary_version": "1.6.2-3ubuntu1" } ] }
{ "binaries": [ { "binary_name": "icedtea-8-plugin", "binary_version": "1.8-0ubuntu8~18.04" }, { "binary_name": "icedtea-netx", "binary_version": "1.8-0ubuntu8~18.04" }, { "binary_name": "icedtea-netx-common", "binary_version": "1.8-0ubuntu8~18.04" }, { "binary_name": "icedtea-plugin", "binary_version": "1.8-0ubuntu8~18.04" } ] }