SUSE Security Update: Security update for java-1_6_0-openjdk
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1238-1
Rating:             important
References:         #829708 
Cross-References:   CVE-2013-1500 CVE-2013-1571 CVE-2013-2407
                    CVE-2013-2412 CVE-2013-2443 CVE-2013-2444
                    CVE-2013-2445 CVE-2013-2446 CVE-2013-2447
                    CVE-2013-2448 CVE-2013-2450 CVE-2013-2451
                    CVE-2013-2452 CVE-2013-2453 CVE-2013-2455
                    CVE-2013-2456 CVE-2013-2457 CVE-2013-2459
                    CVE-2013-2461 CVE-2013-2463 CVE-2013-2465
                    CVE-2013-2469 CVE-2013-2470 CVE-2013-2471
                    CVE-2013-2472 CVE-2013-2473
Affected Products:
                    SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________

   An update that fixes 26 vulnerabilities is now available.

Description:


   java-1_6_0-openjdk has been updated to Icedtea6-1.12.6
   version.

   Security fixes:

   * S6741606, CVE-2013-2407: Integrate Apache Santuario
   * S7158805, CVE-2013-2445: Better rewriting of nested
   subroutine calls
   * S7170730, CVE-2013-2451: Improve Windows network
   stack support.
   * S8000638, CVE-2013-2450: Improve deserialization
   * S8000642, CVE-2013-2446: Better handling of objects
   for transportation
   * S8001032: Restrict object access
   * S8001033, CVE-2013-2452: Refactor network address
   handling in virtual machine identifiers   * S8001034, CVE-2013-1500: Memory management
   improvements
   * S8001038, CVE-2013-2444: Resourcefully handle
   resources
   * S8001043: Clarify definition restrictions
   * S8001309: Better handling of annotation interfaces
   * S8001318, CVE-2013-2447: Socket.getLocalAddress not
   consistent with InetAddress.getLocalHost
   * S8001330, CVE-2013-2443: Improve on checking order
   * S8003703, CVE-2013-2412: Update RMI connection dialog
   box
   * S8004584: Augment applet contextualization
   * S8005007: Better glyph processing
   * S8006328, CVE-2013-2448: Improve robustness of sound
   classes
   * S8006611: Improve scripting
   * S8007467: Improve robustness of JMX internal APIs
   * S8007471: Improve MBean notifications
   * S8007812, CVE-2013-2455: (reflect)
   Class.getEnclosingMethod problematic for some classes
   * S8008120, CVE-2013-2457: Improve JMX class checking
   * S8008124, CVE-2013-2453: Better compliance testing
   * S8008128: Better API coherence for JMX
   * S8008132, CVE-2013-2456: Better serialization support
   * S8008585: Better JMX data handling
   * S8008593: Better URLClassLoader resource management
   * S8008603: Improve provision of JMX providers
   Security Issue references:

   * CVE-2013-2407
   
   * CVE-2013-2445
   
   * CVE-2013-2451
   
   * CVE-2013-2450
   
   * CVE-2013-2446
   
   * CVE-2013-2452
   
   * CVE-2013-1500
   
   * CVE-2013-2444
   
   * CVE-2013-2447
   
   * CVE-2013-2443
   
   * CVE-2013-2412
   
   * CVE-2013-2448
   
   * CVE-2013-2455
   
   * CVE-2013-2457
   
   * CVE-2013-2453
   
   * CVE-2013-2456
   
   * CVE-2013-2459
   
   * CVE-2013-2470
   
   * CVE-2013-2471
   
   * CVE-2013-2472
   
   * CVE-2013-2473
   
   * CVE-2013-1571
   
   * CVE-2013-2463
   
   * CVE-2013-2465
   
   * CVE-2013-2469
   
   * CVE-2013-2461
   


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp2-java-1_6_0-openjdk-8084

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):

      java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1
      java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1
      java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1


References:

   https://www.suse.com/security/cve/CVE-2013-1500.html
   https://www.suse.com/security/cve/CVE-2013-1571.html
   https://www.suse.com/security/cve/CVE-2013-2407.html
   https://www.suse.com/security/cve/CVE-2013-2412.html
   https://www.suse.com/security/cve/CVE-2013-2443.html
   https://www.suse.com/security/cve/CVE-2013-2444.html
   https://www.suse.com/security/cve/CVE-2013-2445.html
   https://www.suse.com/security/cve/CVE-2013-2446.html
   https://www.suse.com/security/cve/CVE-2013-2447.html
   https://www.suse.com/security/cve/CVE-2013-2448.html
   https://www.suse.com/security/cve/CVE-2013-2450.html
   https://www.suse.com/security/cve/CVE-2013-2451.html
   https://www.suse.com/security/cve/CVE-2013-2452.html
   https://www.suse.com/security/cve/CVE-2013-2453.html
   https://www.suse.com/security/cve/CVE-2013-2455.html
   https://www.suse.com/security/cve/CVE-2013-2456.html
   https://www.suse.com/security/cve/CVE-2013-2457.html
   https://www.suse.com/security/cve/CVE-2013-2459.html
   https://www.suse.com/security/cve/CVE-2013-2461.html
   https://www.suse.com/security/cve/CVE-2013-2463.html
   https://www.suse.com/security/cve/CVE-2013-2465.html
   https://www.suse.com/security/cve/CVE-2013-2469.html
   https://www.suse.com/security/cve/CVE-2013-2470.html
   https://www.suse.com/security/cve/CVE-2013-2471.html
   https://www.suse.com/security/cve/CVE-2013-2472.html
   https://www.suse.com/security/cve/CVE-2013-2473.html
   https://bugzilla.novell.com/829708
   https://login.microfocus.com/nidp/idff/sso

SuSE: 2013:1238-1: important: java-1_6_0-openjdk

July 23, 2013
An update that fixes 26 vulnerabilities is now available

Summary

java-1_6_0-openjdk has been updated to Icedtea6-1.12.6 version. Security fixes: * S6741606, CVE-2013-2407: Integrate Apache Santuario * S7158805, CVE-2013-2445: Better rewriting of nested subroutine calls * S7170730, CVE-2013-2451: Improve Windows network stack support. * S8000638, CVE-2013-2450: Improve deserialization * S8000642, CVE-2013-2446: Better handling of objects for transportation * S8001032: Restrict object access * S8001033, CVE-2013-2452: Refactor network address handling in virtual machine identifiers * S8001034, CVE-2013-1500: Memory management improvements * S8001038, CVE-2013-2444: Resourcefully handle resources * S8001043: Clarify definition restrictions * S8001309: Better handling of annotation interfaces * S8001318, CVE-2013-2447: Socket.getLocalAddress not consistent with InetAddress.getLocalHost * S8001330, CVE-2013-2443: Improve on checking order * S8003703, CVE-2013-2412: Update RMI connection dialog box * S8004584: Augment applet contextualization * S8005007: Better glyph processing * S8006328, CVE-2013-2448: Improve robustness of sound classes * S8006611: Improve scripting * S8007467: Improve robustness of JMX internal APIs * S8007471: Improve MBean notifications * S8007812, CVE-2013-2455: (reflect) Class.getEnclosingMethod problematic for some classes * S8008120, CVE-2013-2457: Improve JMX class checking * S8008124, CVE-2013-2453: Better compliance testing * S8008128: Better API coherence for JMX * S8008132, CVE-2013-2456: Better serialization support * S8008585: Better JMX data handling * S8008593: Better URLClassLoader resource management * S8008603: Improve provision of JMX providers Security Issue references: * CVE-2013-2407 * CVE-2013-2445 * CVE-2013-2451 * CVE-2013-2450 * CVE-2013-2446 * CVE-2013-2452 * CVE-2013-1500 * CVE-2013-2444 * CVE-2013-2447 * CVE-2013-2443 * CVE-2013-2412 * CVE-2013-2448 * CVE-2013-2455 * CVE-2013-2457 * CVE-2013-2453 * CVE-2013-2456 * CVE-2013-2459 * CVE-2013-2470 * CVE-2013-2471 * CVE-2013-2472 * CVE-2013-2473 * CVE-2013-1571 * CVE-2013-2463 * CVE-2013-2465 * CVE-2013-2469 * CVE-2013-2461 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-java-1_6_0-openjdk-8084 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1

References

#829708

Cross- CVE-2013-1500 CVE-2013-1571 CVE-2013-2407

CVE-2013-2412 CVE-2013-2443 CVE-2013-2444

CVE-2013-2445 CVE-2013-2446 CVE-2013-2447

CVE-2013-2448 CVE-2013-2450 CVE-2013-2451

CVE-2013-2452 CVE-2013-2453 CVE-2013-2455

CVE-2013-2456 CVE-2013-2457 CVE-2013-2459

CVE-2013-2461 CVE-2013-2463 CVE-2013-2465

CVE-2013-2469 CVE-2013-2470 CVE-2013-2471

CVE-2013-2472 CVE-2013-2473

Affected Products:

SUSE Linux Enterprise Desktop 11 SP2

https://www.suse.com/security/cve/CVE-2013-1500.html

https://www.suse.com/security/cve/CVE-2013-1571.html

https://www.suse.com/security/cve/CVE-2013-2407.html

https://www.suse.com/security/cve/CVE-2013-2412.html

https://www.suse.com/security/cve/CVE-2013-2443.html

https://www.suse.com/security/cve/CVE-2013-2444.html

https://www.suse.com/security/cve/CVE-2013-2445.html

https://www.suse.com/security/cve/CVE-2013-2446.html

https://www.suse.com/security/cve/CVE-2013-2447.html

https://www.suse.com/security/cve/CVE-2013-2448.html

https://www.suse.com/security/cve/CVE-2013-2450.html

https://www.suse.com/security/cve/CVE-2013-2451.html

https://www.suse.com/security/cve/CVE-2013-2452.html

https://www.suse.com/security/cve/CVE-2013-2453.html

https://www.suse.com/security/cve/CVE-2013-2455.html

https://www.suse.com/security/cve/CVE-2013-2456.html

https://www.suse.com/security/cve/CVE-2013-2457.html

https://www.suse.com/security/cve/CVE-2013-2459.html

https://www.suse.com/security/cve/CVE-2013-2461.html

https://www.suse.com/security/cve/CVE-2013-2463.html

https://www.suse.com/security/cve/CVE-2013-2465.html

https://www.suse.com/security/cve/CVE-2013-2469.html

https://www.suse.com/security/cve/CVE-2013-2470.html

https://www.suse.com/security/cve/CVE-2013-2471.html

https://www.suse.com/security/cve/CVE-2013-2472.html

https://www.suse.com/security/cve/CVE-2013-2473.html

https://bugzilla.novell.com/829708

https://login.microfocus.com/nidp/idff/sso

Severity
Announcement ID: SUSE-SU-2013:1238-1
Rating: important

Related News