USN-1755-1: OpenJDK 6 vulnerabilities

Ubuntu Security Notice USN-1755-1

5th March, 2013

openjdk-6 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS
  • Ubuntu 11.10
  • Ubuntu 10.04 LTS

Summary

OpenJDK could be made to crash or run programs as your login if it opened a specially crafted file.

Software description

  • openjdk-6 - Open Source Java implementation

Details

It was discovered that OpenJDK did not properly validate certain types
of images. A remote attacker could exploit this to cause OpenJDK to crash.
(CVE-2013-0809)

It was discovered that OpenJDK did not properly check return values when
performing color conversion for images. If a user were tricked into
opening a crafted image with OpenJDK, such as with the Java plugin, a
remote attacker could cause OpenJDK to crash or execute arbitrary code
outside of the Java sandbox with the privileges of the user invoking the
program. (CVE-2013-1493)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 12.04 LTS:
icedtea-6-jre-cacao 6b27-1.12.3-0ubuntu1~12.04.1
icedtea-6-jre-jamvm 6b27-1.12.3-0ubuntu1~12.04.1
openjdk-6-jre 6b27-1.12.3-0ubuntu1~12.04.1
openjdk-6-jre-headless 6b27-1.12.3-0ubuntu1~12.04.1
openjdk-6-jre-zero 6b27-1.12.3-0ubuntu1~12.04.1
openjdk-6-jre-lib 6b27-1.12.3-0ubuntu1~12.04.1
Ubuntu 11.10:
icedtea-6-jre-cacao 6b27-1.12.3-0ubuntu1~11.10.1
icedtea-6-jre-jamvm 6b27-1.12.3-0ubuntu1~11.10.1
openjdk-6-jre 6b27-1.12.3-0ubuntu1~11.10.1
openjdk-6-jre-headless 6b27-1.12.3-0ubuntu1~11.10.1
openjdk-6-jre-zero 6b27-1.12.3-0ubuntu1~11.10.1
openjdk-6-jre-lib 6b27-1.12.3-0ubuntu1~11.10.1
Ubuntu 10.04 LTS:
openjdk-6-jre-headless 6b27-1.12.3-0ubuntu1~10.04.1
openjdk-6-jre-lib 6b27-1.12.3-0ubuntu1~10.04.1
icedtea-6-jre-cacao 6b27-1.12.3-0ubuntu1~10.04.1
openjdk-6-jre 6b27-1.12.3-0ubuntu1~10.04.1
openjdk-6-jre-zero 6b27-1.12.3-0ubuntu1~10.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart any applications using
OpenJDK, such as your browser, to make all the necessary changes.

References

CVE-2013-0809, CVE-2013-1493