-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=cHwC
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1755-1
March 05, 2013
openjdk-6 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS
Summary:
OpenJDK could be made to crash or run programs as your login if it opened a
specially crafted file.
Software Description:
- openjdk-6: Open Source Java implementation
Details:
It was discovered that OpenJDK did not properly validate certain types
of images. A remote attacker could exploit this to cause OpenJDK to crash.
(CVE-2013-0809)
It was discovered that OpenJDK did not properly check return values when
performing color conversion for images. If a user were tricked into
opening a crafted image with OpenJDK, such as with the Java plugin, a
remote attacker could cause OpenJDK to crash or execute arbitrary code
outside of the Java sandbox with the privileges of the user invoking the
program. (CVE-2013-1493)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
icedtea-6-jre-cacao 6b27-1.12.3-0ubuntu1~12.04.1
icedtea-6-jre-jamvm 6b27-1.12.3-0ubuntu1~12.04.1
openjdk-6-jre 6b27-1.12.3-0ubuntu1~12.04.1
openjdk-6-jre-headless 6b27-1.12.3-0ubuntu1~12.04.1
openjdk-6-jre-lib 6b27-1.12.3-0ubuntu1~12.04.1
openjdk-6-jre-zero 6b27-1.12.3-0ubuntu1~12.04.1
Ubuntu 11.10:
icedtea-6-jre-cacao 6b27-1.12.3-0ubuntu1~11.10.1
icedtea-6-jre-jamvm 6b27-1.12.3-0ubuntu1~11.10.1
openjdk-6-jre 6b27-1.12.3-0ubuntu1~11.10.1
openjdk-6-jre-headless 6b27-1.12.3-0ubuntu1~11.10.1
openjdk-6-jre-lib 6b27-1.12.3-0ubuntu1~11.10.1
openjdk-6-jre-zero 6b27-1.12.3-0ubuntu1~11.10.1
Ubuntu 10.04 LTS:
icedtea-6-jre-cacao 6b27-1.12.3-0ubuntu1~10.04.1
openjdk-6-jre 6b27-1.12.3-0ubuntu1~10.04.1
openjdk-6-jre-headless 6b27-1.12.3-0ubuntu1~10.04.1
openjdk-6-jre-lib 6b27-1.12.3-0ubuntu1~10.04.1
openjdk-6-jre-zero 6b27-1.12.3-0ubuntu1~10.04.1
After a standard system update you need to restart any applications using
OpenJDK, such as your browser, to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1755-1
CVE-2013-0809, CVE-2013-1493
Package Information:
https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.3-0ubuntu1~12.04.1
https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.3-0ubuntu1~11.10.1
https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.3-0ubuntu1~10.04.1
No comments:
Post a Comment