This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============3963883503930328121== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig51FAB16228FE96D3E81098FC"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig51FAB16228FE96D3E81098FC Content-Type: text/plain; charset=UTF- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1907-2 July 16, 2013
icedtea-web update ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS
Summary:
IcedTea Web updated to work with new OpenJDK 7.
Software Description: - icedtea-web: A web browser plugin to execute Java applets
Details:
USN-1907-1 fixed vulnerabilities in OpenJDK 7. Due to upstream changes, IcedTea Web needed an update to work with the new OpenJDK 7.
Original advisory details:
Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit these to expose sensitive data over the network. (CVE-2013-1500, CVE-2013-2454, CVE-2013-2458)
A vulnerability was discovered in the OpenJDK Javadoc related to data integrity. (CVE-2013-1571)
A vulnerability was discovered in the OpenJDK JRE related to information disclosure and availability. An attacker could exploit this to cause a denial of service or expose sensitive data over the network. (CVE-2013-2407)
Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure. An attacker could exploit these to expose sensitive data over the network. (CVE-2013-2412, CVE-2013-2443, CVE-2013-2446, CVE-2013-2447, CVE-2013-2449, CVE-2013-2452, CVE-2013-2456)
Several vulnerabilities were discovered in the OpenJDK JRE related to availability. An attacker could exploit these to cause a denial of service. (CVE-2013-2444, CVE-2013-2445, CVE-2013-2450)
Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure, data integrity and availability. An attacker could exploit these to cause a denial of service or expose sensitive data over the network. (CVE-2013-2448, CVE-2013-2451, CVE-2013-2459, CVE-2013-2460, CVE-2013-2461, CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473)
Several vulnerabilities were discovered in the OpenJDK JRE related to data integrity. (CVE-2013-2453, CVE-2013-2455, CVE-2013-2457)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 13.04: icedtea-netx 1.3.2-1ubuntu1.1
Ubuntu 12.10: icedtea-netx 1.3.2-1ubuntu0.12.10.2
Ubuntu 12.04 LTS: icedtea-netx 1.2.3-0ubuntu0.12.04.3
After a standard system update you need to restart your browser to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1907-2 http://www.ubuntu.com/usn/usn-1907-1 https://launchpad.net/bugs/1201908
Package Information: https://launchpad.net/ubuntu/+source/icedtea-web/1.3.2-1ubuntu1.1 https://launchpad.net/ubuntu/+source/icedtea-web/1.3.2-1ubuntu0.12.10.2 https://launchpad.net/ubuntu/+source/icedtea-web/1.2.3-0ubuntu0.12.04.3
--------------enig51FAB16228FE96D3E81098FC Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/
iQIcBAEBCgAGBQJR5Yl6AAoJEFHb3FjMVZVzczIP/A2HwQTf4omtwHjkJ8rSWNxk A6XX/t7r22YO9zEfp8E3IlX/dTQMKlpDQyR7R1JMDLDj6r/QnZAqm/Ofi3tO2zzv Zr0cT6RlH0cj7nCvrofdWP5ikHiZfTU4Aq97VYxLhogGYNKBnc9xLa4jN1DRq13a BA+Dj8Kzt50fUlNOk/XtiBdlGmLdo1hDtxXPA7UgJsDkmC7CygX+oaKEwGiqPj0m OajpCpOz/JkN0ea1Bl19rOLKSLNr80jldHdYjPvnVoMsSWMNGWNtS26xAherb8dj a24tfJFNrN88OxO1Wn/p2DaVwMFSnlGMG0R0Hhw2Cp3uncL6oCn/bQy0OnW1bINB lt7j+ndh3HsnegqbYqqxwClfQw8Mkgz7Iz2ihA+n6Skmewa68oGuEswsP4Qle/xJ KqfsxeuTBaqov8OBu/RJG4EelP2bmPk4T8gfKNLhwl3Mm9wULUIBj3iXiaYmE+OX Dsq6phiAeRC1SVoreukLg6xQcQ7UNpUKfUowedci7XpQeZeTMLETdpgR0GHKQOCK FthfbUCMPzutvXYAomXwg9aEvqE3iIPoTHOzdeyRNHGnQTwMcXpRZCNvRx9+ck1m 3mtHJauKCo6j5XTUtvHqaAuaf/U2ZXXSsSPcH+Tox50YDwwtb6moRPhnlL0Ufb+n sXOVyg/K8VjEsmiOt9Fi =RKXR -----END PGP SIGNATURE-----
--------------enig51FAB16228FE96D3E81098FC--
--===============3963883503930328121== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============3963883503930328121==--
|