User: Password:
Subscribe / Log in / New account

Mageia alert MGASA-2013-0123 (icedtea-web)

From:  Mageia Updates <>
Subject:  [updates-announce] MGASA-2013-0123: icedtea-web-1.3.2-1.mga2 (2/core)
Date:  Thu, 18 Apr 2013 00:34:27 +0200
Message-ID:  <>
Archive-link:  Article, Thread

MGASA-2013-0123 Date: April 18th, 2013 Affected releases: 2 Media: Core Description: Updated icedtea-web packages fix security vulnerabilities: It was discovered that the IcedTea-Web plug-in incorrectly used the same class loader instance for applets with the same value of the codebase attribute, even when they originated from different domains. A malicious applet could use this flaw to gain information about and possibly manipulate applets from different domains currently running in the browser (CVE-2013-1926). The IcedTea-Web plug-in did not properly check the format of the downloaded Java Archive (JAR) files. This could cause the plug-in to execute code hidden in a file in a different format, possibly allowing attackers to execute code in the context of web sites that allow uploads of specific file types, known as a GIFAR attack (CVE-2013-1927). Updated Packages: i586: icedtea-web-1.3.2-1.mga2.i586.rpm icedtea-web-javadoc-1.3.2-1.mga2.noarch.rpm icedtea-web-debug-1.3.2-1.mga2.i586.rpm x86_64: icedtea-web-1.3.2-1.mga2.x86_64.rpm icedtea-web-javadoc-1.3.2-1.mga2.noarch.rpm icedtea-web-debug-1.3.2-1.mga2.x86_64.rpm SRPMS: icedtea-web-1.3.2-1.mga2.src.rpm References:

(Log in to post comments)

Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds