openSUSE Security Update : icedtea-web (openSUSE-SU-2013:0715-1)

medium Nessus Plugin ID 74979

Synopsis

The remote openSUSE host is missing a security update.

Description

- update to 1.3.2 (bnc#815596)

- Security Updates

- CVE-2013-1927, RH884705: fixed gifar vulnerability

- CVE-2013-1926, RH916774: Class-loader incorrectly shared for applets with same relative-path.

- Common

- Added new option in itw-settings which allows users to set JVM arguments when plugin is initialized.

- NetX

- PR580: http://www.horaoficial.cl/ loads improperly

- Plugin

- PR1260: IcedTea-Web should not rely on GTK obsoletes icedtea-web-remove-gtk-dep.patch

- PR1157: Applets can hang browser after fatal exception

- Add icedtea-web-remove-gtk-dep.patch, build icedtea-web without GTK. Plugin now works in both gtk2 and gtk3 based browsers.

- limit the provides/obsoletes to architectures, where
-plugin package existed and don't pollute shiny new arm with an old garbage

- handle the package renaming on arm properly

Solution

Update the affected icedtea-web packages.

See Also

http://www.horaoficial.cl/

https://bugzilla.novell.com/show_bug.cgi?id=815596

https://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html

Plugin Details

Severity: Medium

ID: 74979

File Name: openSUSE-2013-371.nasl

Version: 1.4

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:icedtea-web-debuginfo, p-cpe:/a:novell:opensuse:icedtea-web-javadoc, cpe:/o:novell:opensuse:12.2, p-cpe:/a:novell:opensuse:icedtea-web-debugsource, p-cpe:/a:novell:opensuse:icedtea-web

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 4/17/2013

Reference Information

CVE: CVE-2013-1926, CVE-2013-1927