A flaw was found in the way the AWT component of OpenJDK handled splash screen images. A specially crafted image could possibly cause JVM memory corruption. A malicious Java application or applet could use this flaw to execute arbitrary code with JVM privileges, bypassing Java sandbox restrictions. This issue affected native code for Windows platform. Linux builds of OpenJDK do not use the affected code and are unaffected by this issue.
Statement: Not vulnerable. This issue did not affect the versions of OpenJDK as shipped with Red Hat Enterprise Linux.
Public now via Oracle Critical Patch Update - October 2014. Fixed in Oracle Java SE 6u85, 7u71, and 8u25. External References: http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html#AppendixJAVA