[Trisquel-security] [USN-1755-1] OpenJDK 6 vulnerabilities

Jamie Strandboge jamie at canonical.com
Wed Mar 6 02:11:37 CET 2013


==========================================================================
Ubuntu Security Notice USN-1755-1
March 05, 2013

openjdk-6 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS

Summary:

OpenJDK could be made to crash or run programs as your login if it opened a
specially crafted file.

Software Description:
- openjdk-6: Open Source Java implementation

Details:

It was discovered that OpenJDK did not properly validate certain types
of images. A remote attacker could exploit this to cause OpenJDK to crash.
(CVE-2013-0809)

It was discovered that OpenJDK did not properly check return values when
performing color conversion for images. If a user were tricked into
opening a crafted image with OpenJDK, such as with the Java plugin, a
remote attacker could cause OpenJDK to crash or execute arbitrary code
outside of the Java sandbox with the privileges of the user invoking the
program. (CVE-2013-1493)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
  icedtea-6-jre-cacao             6b27-1.12.3-0ubuntu1~12.04.1
  icedtea-6-jre-jamvm             6b27-1.12.3-0ubuntu1~12.04.1
  openjdk-6-jre                   6b27-1.12.3-0ubuntu1~12.04.1
  openjdk-6-jre-headless          6b27-1.12.3-0ubuntu1~12.04.1
  openjdk-6-jre-lib               6b27-1.12.3-0ubuntu1~12.04.1
  openjdk-6-jre-zero              6b27-1.12.3-0ubuntu1~12.04.1

Ubuntu 11.10:
  icedtea-6-jre-cacao             6b27-1.12.3-0ubuntu1~11.10.1
  icedtea-6-jre-jamvm             6b27-1.12.3-0ubuntu1~11.10.1
  openjdk-6-jre                   6b27-1.12.3-0ubuntu1~11.10.1
  openjdk-6-jre-headless          6b27-1.12.3-0ubuntu1~11.10.1
  openjdk-6-jre-lib               6b27-1.12.3-0ubuntu1~11.10.1
  openjdk-6-jre-zero              6b27-1.12.3-0ubuntu1~11.10.1

Ubuntu 10.04 LTS:
  icedtea-6-jre-cacao             6b27-1.12.3-0ubuntu1~10.04.1
  openjdk-6-jre                   6b27-1.12.3-0ubuntu1~10.04.1
  openjdk-6-jre-headless          6b27-1.12.3-0ubuntu1~10.04.1
  openjdk-6-jre-lib               6b27-1.12.3-0ubuntu1~10.04.1
  openjdk-6-jre-zero              6b27-1.12.3-0ubuntu1~10.04.1

After a standard system update you need to restart any applications using
OpenJDK, such as your browser, to make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-1755-1
  CVE-2013-0809, CVE-2013-1493

Package Information:

https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.3-0ubuntu1~12.04.1

https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.3-0ubuntu1~11.10.1

https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.3-0ubuntu1~10.04.1




-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 899 bytes
Desc: OpenPGP digital signature
URL: <http://listas.trisquel.info/pipermail/trisquel-security/attachments/20130305/7c4359e1/attachment.pgp>
-------------- next part --------------
-- 
ubuntu-security-announce mailing list
ubuntu-security-announce at lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


More information about the Trisquel-security mailing list