CVE-2013-2035

Publication date 28 August 2013

Last updated 24 July 2024


Ubuntu priority

Race condition in hawtjni-runtime/src/main/java/org/fusesource/hawtjni/runtime/Library.java in HawtJNI before 1.8, when a custom library path is not specified, allows local users to execute arbitrary Java code by overwriting a temporary JAR file with a predictable name in /tmp.

From the Ubuntu Security Team

It was discovered that HawtJNI wrote files with predictable names to /tmp. A local attacker could exploit a race condition by overwriting the predictably named temporary files, resulting in arbitrary code execution.

Status

Package Ubuntu Release Status
hawtjni 18.10 cosmic
Not affected
18.04 LTS bionic
Not affected
17.10 artful Ignored end of life
17.04 zesty Ignored end of life
16.10 yakkety Ignored end of life
16.04 LTS xenial
Not affected
15.10 wily Ignored end of life
15.04 vivid Ignored end of life
14.10 utopic Ignored end of life
14.04 LTS trusty
Fixed 1.0~+git0c502e20c4-3+deb7u1build0.14.04.1
13.10 saucy Ignored end of life
13.04 raring Ignored end of life
12.10 quantal Ignored end of life
12.04 LTS precise Ignored end of life
10.04 LTS lucid Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
hawtjni