| From: |
| opensuse-security@opensuse.org |
| To: |
| opensuse-updates@opensuse.org |
| Subject: |
| openSUSE-SU-2013:1247-1: moderate: java-1_6_0-openjdk to IcedTea
1.12.6 |
| Date: |
| Wed, 24 Jul 2013 15:04:29 +0200 (CEST) |
| Message-ID: |
| <20130724130429.4387F3224A@maintenance.suse.de> |
| Archive-link: |
| Article, Thread
|
openSUSE Security Update: java-1_6_0-openjdk to IcedTea 1.12.6
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:1247-1
Rating: moderate
References:
Cross-References: CVE-2013-1500 CVE-2013-1571 CVE-2013-2407
CVE-2013-2412 CVE-2013-2443 CVE-2013-2444
CVE-2013-2445 CVE-2013-2446 CVE-2013-2447
CVE-2013-2448 CVE-2013-2450 CVE-2013-2451
CVE-2013-2452 CVE-2013-2453 CVE-2013-2455
CVE-2013-2456 CVE-2013-2457 CVE-2013-2459
CVE-2013-2461 CVE-2013-2463 CVE-2013-2465
CVE-2013-2469 CVE-2013-2470 CVE-2013-2471
CVE-2013-2472 CVE-2013-2473
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes 26 vulnerabilities is now available.
Description:
These releases update our OpenJDK 6 support to include the
latest security updates.
The security fixes are as follows:
* S6741606, CVE-2013-2407: Integrate Apache Santuario
* S7158805, CVE-2013-2445: Better rewriting of nested
subroutine calls
* S7170730, CVE-2013-2451: Improve Windows network stack
support.
* S8000638, CVE-2013-2450: Improve deserialization
* S8000642, CVE-2013-2446: Better handling of objects for
transportation
* S8001032: Restrict object access
* S8001033, CVE-2013-2452: Refactor network address
handling in virtual machine identifiers
* S8001034, CVE-2013-1500: Memory management improvements
* S8001038, CVE-2013-2444: Resourcefully handle resources
* S8001043: Clarify definition restrictions
* S8001309: Better handling of annotation interfaces
* S8001318, CVE-2013-2447: Socket.getLocalAddress not
consistent with InetAddress.getLocalHost
* S8001330, CVE-2013-2443: Improve on checking order
* S8003703, CVE-2013-2412: Update RMI connection dialog box
* S8004584: Augment applet contextualization
* S8005007: Better glyph processing
* S8006328, CVE-2013-2448: Improve robustness of sound
classes
* S8006611: Improve scripting
* S8007467: Improve robustness of JMX internal APIs
* S8007471: Improve MBean notifications
* S8007812, CVE-2013-2455: (reflect)
Class.getEnclosingMethod problematic for some classes
* S8008120, CVE-2013-2457: Improve JMX class checking
* S8008124, CVE-2013-2453: Better compliance testing
* S8008128: Better API coherence for JMX
* S8008132, CVE-2013-2456: Better serialization support
* S8008585: Better JMX data handling
* S8008593: Better URLClassLoader resource management
* S8008603: Improve provision of JMX providers
* S8008611: Better handling of annotations in JMX
* S8008615: Improve robustness of JMX internal APIs
* S8008623: Better handling of MBeanServers
* S8008744, CVE-2013-2407: Rework part of fix for
JDK-6741606
* S8008982: Adjust JMX for underlying interface changes
* S8009004: Better implementation of RMI connections
* S8009013: Better handling of T2K glyphs
* S8009034: Improve resulting notifications in JMX
* S8009038: Improve JMX notification support
* S8009067: Improve storing keys in KeyStore
* S8009071, CVE-2013-2459: Improve shape handling
* S8009235: Improve handling of TSA data
* S8011243, CVE-2013-2470: Improve ImagingLib
* S8011248, CVE-2013-2471: Better Component Rasters
* S8011253, CVE-2013-2472: Better Short Component Rasters
* S8011257, CVE-2013-2473: Better Byte Component Rasters
* S8012375, CVE-2013-1571: Improve Javadoc framing
* S8012421: Better positioning of PairPositioning
* S8012438, CVE-2013-2463: Better image validation
* S8012597, CVE-2013-2465: Better image channel
verification
* S8012601, CVE-2013-2469: Better validation of image
layouts
* S8014281, CVE-2013-2461: Better checking of XML signature
* S8015997: Additional improvement in Javadoc framing
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch 2013-113
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-41.1
java-1_6_0-openjdk-debuginfo-1.6.0.0_b27.1.12.6-41.1
java-1_6_0-openjdk-debugsource-1.6.0.0_b27.1.12.6-41.1
java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-41.1
java-1_6_0-openjdk-demo-debuginfo-1.6.0.0_b27.1.12.6-41.1
java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-41.1
java-1_6_0-openjdk-devel-debuginfo-1.6.0.0_b27.1.12.6-41.1
java-1_6_0-openjdk-javadoc-1.6.0.0_b27.1.12.6-41.1
java-1_6_0-openjdk-src-1.6.0.0_b27.1.12.6-41.1
References:
http://support.novell.com/security/cve/CVE-2013-1500.html
http://support.novell.com/security/cve/CVE-2013-1571.html
http://support.novell.com/security/cve/CVE-2013-2407.html
http://support.novell.com/security/cve/CVE-2013-2412.html
http://support.novell.com/security/cve/CVE-2013-2443.html
http://support.novell.com/security/cve/CVE-2013-2444.html
http://support.novell.com/security/cve/CVE-2013-2445.html
http://support.novell.com/security/cve/CVE-2013-2446.html
http://support.novell.com/security/cve/CVE-2013-2447.html
http://support.novell.com/security/cve/CVE-2013-2448.html
http://support.novell.com/security/cve/CVE-2013-2450.html
http://support.novell.com/security/cve/CVE-2013-2451.html
http://support.novell.com/security/cve/CVE-2013-2452.html
http://support.novell.com/security/cve/CVE-2013-2453.html
http://support.novell.com/security/cve/CVE-2013-2455.html
http://support.novell.com/security/cve/CVE-2013-2456.html
http://support.novell.com/security/cve/CVE-2013-2457.html
http://support.novell.com/security/cve/CVE-2013-2459.html
http://support.novell.com/security/cve/CVE-2013-2461.html
http://support.novell.com/security/cve/CVE-2013-2463.html
http://support.novell.com/security/cve/CVE-2013-2465.html
http://support.novell.com/security/cve/CVE-2013-2469.html
http://support.novell.com/security/cve/CVE-2013-2470.html
http://support.novell.com/security/cve/CVE-2013-2471.html
http://support.novell.com/security/cve/CVE-2013-2472.html
http://support.novell.com/security/cve/CVE-2013-2473.html
(
Log in to post comments)