SUSE-SU-2012:1398-1: important: Security update for OpenJDK

sle-updates at lists.suse.com sle-updates at lists.suse.com
Wed Oct 24 14:08:43 MDT 2012


   SUSE Security Update: Security update for OpenJDK
______________________________________________________________________________

Announcement ID:    SUSE-SU-2012:1398-1
Rating:             important
References:         #785433 
Cross-References:   CVE-2012-1531 CVE-2012-1532 CVE-2012-1533
                    CVE-2012-3143 CVE-2012-3159 CVE-2012-3216
                    CVE-2012-4416 CVE-2012-4681 CVE-2012-5067
                    CVE-2012-5068 CVE-2012-5069 CVE-2012-5070
                    CVE-2012-5071 CVE-2012-5072 CVE-2012-5073
                    CVE-2012-5074 CVE-2012-5075 CVE-2012-5076
                    CVE-2012-5077 CVE-2012-5078 CVE-2012-5079
                    CVE-2012-5080 CVE-2012-5081 CVE-2012-5082
                    CVE-2012-5083 CVE-2012-5084 CVE-2012-5085
                    CVE-2012-5086 CVE-2012-5087 CVE-2012-5088
                    CVE-2012-5089
Affected Products:
                    SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________

   An update that fixes 31 vulnerabilities is now available.

Description:


   java-openjdk was upgraded to version 1.11.5 to fix various
   security and  non-security issues.

   Security Issue references:

   * CVE-2012-4681
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4681
   >
   * CVE-2012-5083
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5083
   >
   * CVE-2012-1531
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1531
   >
   * CVE-2012-5086
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5086
   >
   * CVE-2012-5087
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5087
   >
   * CVE-2012-1533
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1533
   >
   * CVE-2012-1532
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1532
   >
   * CVE-2012-5076
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5076
   >
   * CVE-2012-3143
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3143
   >
   * CVE-2012-5088
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5088
   >
   * CVE-2012-5078
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5078
   >
   * CVE-2012-5089
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5089
   >
   * CVE-2012-5084
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5084
   >
   * CVE-2012-5080
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5080
   >
   * CVE-2012-3159
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3159
   >
   * CVE-2012-5068
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5068
   >
   * CVE-2012-4416
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4416
   >
   * CVE-2012-5074
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5074
   >
   * CVE-2012-5071
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5071
   >
   * CVE-2012-5069
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5069
   >
   * CVE-2012-5067
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5067
   >
   * CVE-2012-5070
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5070
   >
   * CVE-2012-5075
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5075
   >
   * CVE-2012-5073
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5073
   >
   * CVE-2012-5079
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5079
   >
   * CVE-2012-5072
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5072
   >
   * CVE-2012-5081
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5081
   >
   * CVE-2012-5082
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5082
   >
   * CVE-2012-3216
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3216
   >
   * CVE-2012-5077
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5077
   >
   * CVE-2012-5085
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5085
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp2-java-1_6_0-openjdk-6987

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):

      java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1
      java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1
      java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1


References:

   http://support.novell.com/security/cve/CVE-2012-1531.html
   http://support.novell.com/security/cve/CVE-2012-1532.html
   http://support.novell.com/security/cve/CVE-2012-1533.html
   http://support.novell.com/security/cve/CVE-2012-3143.html
   http://support.novell.com/security/cve/CVE-2012-3159.html
   http://support.novell.com/security/cve/CVE-2012-3216.html
   http://support.novell.com/security/cve/CVE-2012-4416.html
   http://support.novell.com/security/cve/CVE-2012-4681.html
   http://support.novell.com/security/cve/CVE-2012-5067.html
   http://support.novell.com/security/cve/CVE-2012-5068.html
   http://support.novell.com/security/cve/CVE-2012-5069.html
   http://support.novell.com/security/cve/CVE-2012-5070.html
   http://support.novell.com/security/cve/CVE-2012-5071.html
   http://support.novell.com/security/cve/CVE-2012-5072.html
   http://support.novell.com/security/cve/CVE-2012-5073.html
   http://support.novell.com/security/cve/CVE-2012-5074.html
   http://support.novell.com/security/cve/CVE-2012-5075.html
   http://support.novell.com/security/cve/CVE-2012-5076.html
   http://support.novell.com/security/cve/CVE-2012-5077.html
   http://support.novell.com/security/cve/CVE-2012-5078.html
   http://support.novell.com/security/cve/CVE-2012-5079.html
   http://support.novell.com/security/cve/CVE-2012-5080.html
   http://support.novell.com/security/cve/CVE-2012-5081.html
   http://support.novell.com/security/cve/CVE-2012-5082.html
   http://support.novell.com/security/cve/CVE-2012-5083.html
   http://support.novell.com/security/cve/CVE-2012-5084.html
   http://support.novell.com/security/cve/CVE-2012-5085.html
   http://support.novell.com/security/cve/CVE-2012-5086.html
   http://support.novell.com/security/cve/CVE-2012-5087.html
   http://support.novell.com/security/cve/CVE-2012-5088.html
   http://support.novell.com/security/cve/CVE-2012-5089.html
   https://bugzilla.novell.com/785433
   http://download.novell.com/patch/finder/?keywords=c230e2b1023ded8fd1041aa18bc26a60



More information about the sle-updates mailing list