openSUSE Security Update: java-1_6_0-openjdk: critical
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2012:0828-1
Rating:             critical
References:         #766802 
Cross-References:   CVE-2012-1711 CVE-2012-1713 CVE-2012-1716
                    CVE-2012-1717 CVE-2012-1718 CVE-2012-1719
                    CVE-2012-1723 CVE-2012-1724 CVE-2012-1725
                   
Affected Products:
                    openSUSE 12.1
                    openSUSE 11.4
______________________________________________________________________________

   An update that fixes 9 vulnerabilities is now available.

Description:

   This version upgrade of java-1_6_0-openjdk fixes multiple
   security flaws:

   - S7079902, CVE-2012-1711: Refine CORBA data models
   - S7143606, CVE-2012-1717: File.createTempFile should be
   improved for temporary files created by the platform.
   - S7143614, CVE-2012-1716: SynthLookAndFeel stability
   improvement
   - S7143617, CVE-2012-1713: Improve fontmanager layout
   lookup operations
   - S7143851, CVE-2012-1719: Improve IIOP stub and tie
   generation in RMIC
   - S7143872, CVE-2012-1718: Improve certificate extension
   processing
   - S7152811, CVE-2012-1723: Issues in client compiler
   - S7157609, CVE-2012-1724: Issues with loop
   - S7160757, CVE-2012-1725: Problem with hotspot
   runtime_classfile


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 12.1:

      zypper in -t patch openSUSE-2012-368

   - openSUSE 11.4:

      zypper in -t patch openSUSE-2012-368

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 12.1 (i586 x86_64):

      java-1_6_0-openjdk-1.6.0.0_b24.1.11.3-6.2
      java-1_6_0-openjdk-debuginfo-1.6.0.0_b24.1.11.3-6.2
      java-1_6_0-openjdk-debugsource-1.6.0.0_b24.1.11.3-6.2
      java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.3-6.2
      java-1_6_0-openjdk-demo-debuginfo-1.6.0.0_b24.1.11.3-6.2
      java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.3-6.2
      java-1_6_0-openjdk-devel-debuginfo-1.6.0.0_b24.1.11.3-6.2
      java-1_6_0-openjdk-javadoc-1.6.0.0_b24.1.11.3-6.2
      java-1_6_0-openjdk-src-1.6.0.0_b24.1.11.3-6.2

   - openSUSE 11.4 (i586 x86_64):

      java-1_6_0-openjdk-1.6.0.0_b24.1.11.3-0.11.2
      java-1_6_0-openjdk-debuginfo-1.6.0.0_b24.1.11.3-0.11.2
      java-1_6_0-openjdk-debugsource-1.6.0.0_b24.1.11.3-0.11.2
      java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.3-0.11.2
      java-1_6_0-openjdk-demo-debuginfo-1.6.0.0_b24.1.11.3-0.11.2
      java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.3-0.11.2
      java-1_6_0-openjdk-devel-debuginfo-1.6.0.0_b24.1.11.3-0.11.2
      java-1_6_0-openjdk-javadoc-1.6.0.0_b24.1.11.3-0.11.2
      java-1_6_0-openjdk-src-1.6.0.0_b24.1.11.3-0.11.2


References:

   https://www.suse.com/security/cve/CVE-2012-1711.html
   https://www.suse.com/security/cve/CVE-2012-1713.html
   https://www.suse.com/security/cve/CVE-2012-1716.html
   https://www.suse.com/security/cve/CVE-2012-1717.html
   https://www.suse.com/security/cve/CVE-2012-1718.html
   https://www.suse.com/security/cve/CVE-2012-1719.html
   https://www.suse.com/security/cve/CVE-2012-1723.html
   https://www.suse.com/security/cve/CVE-2012-1724.html
   https://www.suse.com/security/cve/CVE-2012-1725.html
   https://bugzilla.novell.com/766802

-- 

openSUSE: 2012:0828-1: critical: java-1_6_0-openjdk

July 4, 2012
An update that fixes 9 vulnerabilities is now available.

Description

This version upgrade of java-1_6_0-openjdk fixes multiple security flaws: - S7079902, CVE-2012-1711: Refine CORBA data models - S7143606, CVE-2012-1717: File.createTempFile should be improved for temporary files created by the platform. - S7143614, CVE-2012-1716: SynthLookAndFeel stability improvement - S7143617, CVE-2012-1713: Improve fontmanager layout lookup operations - S7143851, CVE-2012-1719: Improve IIOP stub and tie generation in RMIC - S7143872, CVE-2012-1718: Improve certificate extension processing - S7152811, CVE-2012-1723: Issues in client compiler - S7157609, CVE-2012-1724: Issues with loop - S7160757, CVE-2012-1725: Problem with hotspot runtime_classfile

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.1: zypper in -t patch openSUSE-2012-368 - openSUSE 11.4: zypper in -t patch openSUSE-2012-368 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 12.1 (i586 x86_64): java-1_6_0-openjdk-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-debuginfo-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-debugsource-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-demo-debuginfo-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-devel-debuginfo-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-javadoc-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-src-1.6.0.0_b24.1.11.3-6.2 - openSUSE 11.4 (i586 x86_64): java-1_6_0-openjdk-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-debuginfo-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-debugsource-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-demo-debuginfo-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-devel-debuginfo-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-javadoc-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-src-1.6.0.0_b24.1.11.3-0.11.2


References

https://www.suse.com/security/cve/CVE-2012-1711.html https://www.suse.com/security/cve/CVE-2012-1713.html https://www.suse.com/security/cve/CVE-2012-1716.html https://www.suse.com/security/cve/CVE-2012-1717.html https://www.suse.com/security/cve/CVE-2012-1718.html https://www.suse.com/security/cve/CVE-2012-1719.html https://www.suse.com/security/cve/CVE-2012-1723.html https://www.suse.com/security/cve/CVE-2012-1724.html https://www.suse.com/security/cve/CVE-2012-1725.html https://bugzilla.novell.com/766802--


Severity
Announcement ID: openSUSE-SU-2012:0828-1
Rating: critical
Affected Products: openSUSE 12.1 openSUSE 11.4

Related News