SUSE Security Update: Security update for java-1_7_0-openjdk ______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1254-1 Rating: important References: #828665 Cross-References: CVE-2013-1500 CVE-2013-1571 CVE-2013-2407 CVE-2013-2412 CVE-2013-2443 CVE-2013-2444 CVE-2013-2445 CVE-2013-2446 CVE-2013-2447 CVE-2013-2448 CVE-2013-2449 CVE-2013-2450 CVE-2013-2451 CVE-2013-2452 CVE-2013-2453 CVE-2013-2454 CVE-2013-2455 CVE-2013-2456 CVE-2013-2457 CVE-2013-2458 CVE-2013-2459 CVE-2013-2460 CVE-2013-2461 CVE-2013-2463 CVE-2013-2465 CVE-2013-2469 CVE-2013-2470 CVE-2013-2471 CVE-2013-2472 CVE-2013-2473 Affected Products: SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________
An update that fixes 30 vulnerabilities is now available.
Description:
This update to icedtea-2.4.1 fixes various security issues:
* S6741606, CVE-2013-2407: Integrate Apache Santuario * S7158805, CVE-2013-2445: Better rewriting of nested subroutine calls * S7170730, CVE-2013-2451: Improve Windows network stack support. * S8000638, CVE-2013-2450: Improve deserialization * S8000642, CVE-2013-2446: Better handling of objects for transportation * S8001033, CVE-2013-2452: Refactor network address handling in virtual machine identifiers * S8001034, CVE-2013-1500: Memory management improvements * S8001038, CVE-2013-2444: Resourcefully handle resources * S8001318, CVE-2013-2447: Socket.getLocalAddress not consistent with InetAddress.getLocalHost * S8001330, CVE-2013-2443: Improve on checking order (non-Zero builds only) * S8003703, CVE-2013-2412: Update RMI connection dialog box * S8004288, CVE-2013-2449: (fs) Files.probeContentType problems * S8006328, CVE-2013-2448: Improve robustness of sound classes * S8007812, CVE-2013-2455: (reflect) Class.getEnclosingMethod problematic for some classes * S8008120, CVE-2013-2457: Improve JMX class checking * S8008124, CVE-2013-2453: Better compliance testing * S8008132, CVE-2013-2456: Better serialization support * S8008744, CVE-2013-2407: Rework part of fix for JDK-6741606 * S8009057, CVE-2013-2448: Improve MIDI event handling * S8009071, CVE-2013-2459: Improve shape handling * S8009424, CVE-2013-2458: Adapt Nashorn to JSR-292 implementation change * S8009554, CVE-2013-2454: Improve SerialJavaObject.getFields * S8010209, CVE-2013-2460: Better provision of factories * S8011243, CVE-2013-2470: Improve ImagingLib * S8011248, CVE-2013-2471: Better Component Rasters * S8011253, CVE-2013-2472: Better Short Component Rasters * S8011257, CVE-2013-2473: Better Byte Component Rasters * S8012375, CVE-2013-1571: Improve Javadoc framing * S8012438, CVE-2013-2463: Better image validation * S8012597, CVE-2013-2465: Better image channel verification * S8012601, CVE-2013-2469: Better validation of image layouts * S8014281, CVE-2013-2461: Better checking of XML signature
Security Issue references:
* CVE-2013-2407 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407 > * CVE-2013-2445 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2445 > * CVE-2013-2451 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451 > * CVE-2013-2450 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450 > * CVE-2013-2446 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446 > * CVE-2013-2452 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452 > * CVE-2013-1500 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500 > * CVE-2013-2444 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444 > * CVE-2013-2447 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447 > * CVE-2013-2443 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443 > * CVE-2013-2412 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412 > * CVE-2013-2449 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2449 > * CVE-2013-2448 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448 > * CVE-2013-2455 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455 > * CVE-2013-2457 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457 > * CVE-2013-2453 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453 > * CVE-2013-2456 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456 > * CVE-2013-2459 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459 > * CVE-2013-2458 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2458 > * CVE-2013-2454 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454 > * CVE-2013-2460 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2460 > * CVE-2013-2470 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470 > * CVE-2013-2471 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471 > * CVE-2013-2472 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472 > * CVE-2013-2473 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473 > * CVE-2013-1571 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571 > * CVE-2013-2463 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463 > * CVE-2013-2465 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465 > * CVE-2013-2469 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469 > * CVE-2013-2461 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2461 >
Patch Instructions:
To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-java-1_7_0-openjdk-8090
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
java-1_7_0-openjdk-1.7.0.6-0.19.2 java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 java-1_7_0-openjdk-devel-1.7.0.6-0.19.2
References:
http://support.novell.com/security/cve/CVE-2013-1500.html http://support.novell.com/security/cve/CVE-2013-1571.html http://support.novell.com/security/cve/CVE-2013-2407.html http://support.novell.com/security/cve/CVE-2013-2412.html http://support.novell.com/security/cve/CVE-2013-2443.html http://support.novell.com/security/cve/CVE-2013-2444.html http://support.novell.com/security/cve/CVE-2013-2445.html http://support.novell.com/security/cve/CVE-2013-2446.html http://support.novell.com/security/cve/CVE-2013-2447.html http://support.novell.com/security/cve/CVE-2013-2448.html http://support.novell.com/security/cve/CVE-2013-2449.html http://support.novell.com/security/cve/CVE-2013-2450.html http://support.novell.com/security/cve/CVE-2013-2451.html http://support.novell.com/security/cve/CVE-2013-2452.html http://support.novell.com/security/cve/CVE-2013-2453.html http://support.novell.com/security/cve/CVE-2013-2454.html http://support.novell.com/security/cve/CVE-2013-2455.html http://support.novell.com/security/cve/CVE-2013-2456.html http://support.novell.com/security/cve/CVE-2013-2457.html http://support.novell.com/security/cve/CVE-2013-2458.html http://support.novell.com/security/cve/CVE-2013-2459.html http://support.novell.com/security/cve/CVE-2013-2460.html http://support.novell.com/security/cve/CVE-2013-2461.html http://support.novell.com/security/cve/CVE-2013-2463.html http://support.novell.com/security/cve/CVE-2013-2465.html http://support.novell.com/security/cve/CVE-2013-2469.html http://support.novell.com/security/cve/CVE-2013-2470.html http://support.novell.com/security/cve/CVE-2013-2471.html http://support.novell.com/security/cve/CVE-2013-2472.html http://support.novell.com/security/cve/CVE-2013-2473.html https://bugzilla.novell.com/828665 ?keywords=562c8781d83d70fa81f9b3c9c3f93137
-- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
|