USN-1755-2: OpenJDK 7 vulnerabilities
7 March 2013
OpenJDK could be made to crash or run programs as your login if it opened a specially crafted file.
Releases
Packages
- openjdk-7 - Open Source Java implementation
Details
USN-1755-1 fixed vulnerabilities in OpenJDK 6. This update provides the
corresponding updates for OpenJDK 7.
Original advisory details:
It was discovered that OpenJDK did not properly validate certain types
of images. A remote attacker could exploit this to cause OpenJDK to crash.
(CVE-2013-0809)
It was discovered that OpenJDK did not properly check return values when
performing color conversion for images. If a user were tricked into
opening a crafted image with OpenJDK, such as with the Java plugin, a
remote attacker could cause OpenJDK to crash or execute arbitrary code
outside of the Java sandbox with the privileges of the user invoking the
program. (CVE-2013-1493)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.10
-
openjdk-7-jre-zero
-
7u15-2.3.7-0ubuntu1~12.10.1
-
icedtea-7-jre-jamvm
-
7u15-2.3.7-0ubuntu1~12.10.1
-
icedtea-7-jre-cacao
-
7u15-2.3.7-0ubuntu1~12.10.1
-
openjdk-7-jre-lib
-
7u15-2.3.7-0ubuntu1~12.10.1
-
openjdk-7-jre-headless
-
7u15-2.3.7-0ubuntu1~12.10.1
-
openjdk-7-jre
-
7u15-2.3.7-0ubuntu1~12.10.1
After a standard system update you need to restart any applications using
OpenJDK, such as your browser, to make all the necessary changes.
References
Related notices
- USN-1755-1: openjdk-6, openjdk-6-jre-lib, icedtea-6-jre-jamvm, openjdk-6-jre-headless, openjdk-6-jre-zero, icedtea-6-jre-cacao, openjdk-6-jre