From Mageia wiki
Jump to: navigation, search

MGASA-2013-0123

Date: April 18th, 2013
Affected releases: 2
Media: Core


Description:
Updated icedtea-web packages fix security vulnerabilities:

It was discovered that the IcedTea-Web plug-in incorrectly used the same
class loader instance for applets with the same value of the codebase
attribute, even when they originated from different domains. A malicious
applet could use this flaw to gain information about and possibly
manipulate applets from different domains currently running in the
browser (CVE-2013-1926).

The IcedTea-Web plug-in did not properly check the format of the
downloaded Java Archive (JAR) files. This could cause the plug-in to
execute code hidden in a file in a different format, possibly allowing
attackers to execute code in the context of web sites that allow uploads
of specific file types, known as a GIFAR attack (CVE-2013-1927).


Updated Packages:
i586:
icedtea-web-1.3.2-1.mga2.i586.rpm
icedtea-web-javadoc-1.3.2-1.mga2.noarch.rpm
icedtea-web-debug-1.3.2-1.mga2.i586.rpm

x86_64:
icedtea-web-1.3.2-1.mga2.x86_64.rpm
icedtea-web-javadoc-1.3.2-1.mga2.noarch.rpm
icedtea-web-debug-1.3.2-1.mga2.x86_64.rpm

SRPMS:
icedtea-web-1.3.2-1.mga2.src.rpm


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1926
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1927
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022790.html
https://rhn.redhat.com/errata/RHSA-2013-0753.html
https://bugs.mageia.org/show_bug.cgi?id=9779