USN-1804-2: IcedTea-Web regression
23 April 2013
Due to a regression, IcedTea-Web might not be able to access some sites.
- icedtea-web - A web browser plugin to execute Java applets
USN-1804-1 fixed vulnerabilities in IcedTea-Web. This update introduced
a regression with the Java Network Launching Protocol (JNLP) when fetching
content over SSL under certain configurations, such as when using the
community-supported IcedTead 7 browser plugin. This update fixes the
We apologize for the inconvenience.
Original advisory details:
Jiri Vanek discovered that IcedTea-Web would use the same classloader for
applets from different domains. A remote attacker could exploit this to
expose sensitive information or potentially manipulate applets from other
It was discovered that IcedTea-Web did not properly verify JAR files and
was susceptible to the GIFAR attack. If a user were tricked into opening a
malicious website, a remote attacker could potentially exploit this to
execute code under certain circumstances. (CVE-2013-1927)
The problem can be corrected by updating your system to the following package versions:
After a standard system update you need to restart your browser to make
all the necessary changes.