SUSE-SU-2014:0639-1: important: Security update for OpenJDK

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue May 13 17:05:03 MDT 2014


   SUSE Security Update: Security update for OpenJDK
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:0639-1
Rating:             important
References:         #873873 
Cross-References:   CVE-2013-6629 CVE-2013-6954 CVE-2014-0429
                    CVE-2014-0446 CVE-2014-0451 CVE-2014-0452
                    CVE-2014-0453 CVE-2014-0454 CVE-2014-0455
                    CVE-2014-0456 CVE-2014-0457 CVE-2014-0458
                    CVE-2014-0459 CVE-2014-0460 CVE-2014-0461
                    CVE-2014-1876 CVE-2014-2397 CVE-2014-2398
                    CVE-2014-2402 CVE-2014-2403 CVE-2014-2412
                    CVE-2014-2413 CVE-2014-2414 CVE-2014-2421
                    CVE-2014-2423 CVE-2014-2427
Affected Products:
                    SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________

   An update that fixes 26 vulnerabilities is now available.

Description:


   This java-1_7_0-openjdk update to version 2.4.7 fixes the following
   security and non-security issues:

   *

   Security fixes

   o S8023046: Enhance splashscreen support o S8025005: Enhance
   CORBA initializations o S8025010, CVE-2014-2412: Enhance AWT contexts o
   S8025030, CVE-2014-2414: Enhance stream handling o S8025152,
   CVE-2014-0458: Enhance activation set up o S8026067: Enhance signed jar
   verification o S8026163, CVE-2014-2427: Enhance media provisioning o
   S8026188, CVE-2014-2423: Enhance envelope factory o S8026200: Enhance
   RowSet Factory o S8026716, CVE-2014-2402: (aio) Enhance asynchronous
   channel handling o S8026736, CVE-2014-2398: Enhance Javadoc pages o
   S8026797, CVE-2014-0451: Enhance data transfers o S8026801, CVE-2014-0452:
   Enhance endpoint addressing o S8027766, CVE-2014-0453: Enhance RSA
   processing o S8027775: Enhance ICU code. o S8027841, CVE-2014-0429:
   Enhance pixel manipulations o S8028385: Enhance RowSet Factory o S8029282,
   CVE-2014-2403: Enhance CharInfo set up o S8029286: Enhance subject
   delegation o S8029699: Update Poller demo o S8029730: Improve audio device
   additions o S8029735: Enhance service mgmt natives o S8029740,
   CVE-2014-0446: Enhance handling of loggers o S8029745, CVE-2014-0454:
   Enhance algorithm checking o S8029750: Enhance LCMS color processing
   (in-tree LCMS) o S8029760, CVE-2013-6629: Enhance AWT image libraries
   (in-tree libjpeg) o S8029844, CVE-2014-0455: Enhance argument validation o
   S8029854, CVE-2014-2421: Enhance JPEG decodings o S8029858, CVE-2014-0456:
   Enhance array copies o S8030731, CVE-2014-0460: Improve name service
   robustness o S8031330: Refactor ObjectFactory o S8031335, CVE-2014-0459:
   Better color profiling (in-tree LCMS) o S8031352, CVE-2013-6954: Enhance
   PNG handling (in-tree libpng) o S8031394, CVE-2014-0457: (sl) Fix
   exception handling in ServiceLoader o S8031395: Enhance LDAP processing o
   S8032686, CVE-2014-2413: Issues with method invoke o S8033618,
   CVE-2014-1876: Correct logging output o S8034926, CVE-2014-2397: Attribute
   classes properly o S8036794, CVE-2014-0461: Manage JavaScript instances
   *

   Backports

   o S8004145: New improved hgforest.sh, ctrl-c now properly
   terminates mercurial processes. o S8007625: race with nested repos in
   /common/bin/hgforest.sh o S8011178: improve common/bin/hgforest.sh python
   detection (MacOS) o S8011342: hgforest.sh : 'python --version' not
   supported on older python o S8011350: hgforest.sh uses non-POSIX sh
   features that may fail with some shells o S8024200: handle hg wrapper with
   space after #! o S8025796: hgforest.sh could trigger unbuffered output
   from hg without complicated machinations o S8028388: 9 jaxws tests failed
   in nightly build with java.lang.ClassCastException o S8031477: [macosx]
   Loading AWT native library fails o S8032370: No "Truncated file" warning
   from IIOReadWarningListener on JPEGImageReader o S8035834:
   InetAddress.getLocalHost() can hang after JDK-8030731 was fixed
   *

   Bug fixes

   o PR1393: JPEG support in build is broken on non-system-libjpeg
   builds o PR1726: configure fails looking for ecj.jar before even trying to
   find javac o Red Hat local: Fix for repo with path statting with / . o
   Remove unused hgforest script

   Security Issue references:

   * CVE-2014-2412
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412>
   * CVE-2014-2414
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414>
   * CVE-2014-0458
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458>
   * CVE-2014-2427
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427>
   * CVE-2014-2423
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423>
   * CVE-2014-2402
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402>
   * CVE-2014-2398
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398>
   * CVE-2014-0451
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451>
   * CVE-2014-0452
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452>
   * CVE-2014-0453
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453>
   * CVE-2014-0429
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429>
   * CVE-2014-2403
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403>
   * CVE-2014-0446
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446>
   * CVE-2014-0454
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454>
   * CVE-2013-6629
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629>
   * CVE-2014-0455
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455>
   * CVE-2014-2421
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421>
   * CVE-2014-0456
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456>
   * CVE-2014-0460
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460>
   * CVE-2014-0459
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459>
   * CVE-2013-6954
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954>
   * CVE-2014-0457
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457>
   * CVE-2014-2413
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413>
   * CVE-2014-1876
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876>
   * CVE-2014-2397
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397>
   * CVE-2014-0461
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461>


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Desktop 11 SP3:

      zypper in -t patch sledsp3-java-1_7_0-openjdk-9209

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):

      java-1_7_0-openjdk-1.7.0.6-0.27.1
      java-1_7_0-openjdk-demo-1.7.0.6-0.27.1
      java-1_7_0-openjdk-devel-1.7.0.6-0.27.1


References:

   http://support.novell.com/security/cve/CVE-2013-6629.html
   http://support.novell.com/security/cve/CVE-2013-6954.html
   http://support.novell.com/security/cve/CVE-2014-0429.html
   http://support.novell.com/security/cve/CVE-2014-0446.html
   http://support.novell.com/security/cve/CVE-2014-0451.html
   http://support.novell.com/security/cve/CVE-2014-0452.html
   http://support.novell.com/security/cve/CVE-2014-0453.html
   http://support.novell.com/security/cve/CVE-2014-0454.html
   http://support.novell.com/security/cve/CVE-2014-0455.html
   http://support.novell.com/security/cve/CVE-2014-0456.html
   http://support.novell.com/security/cve/CVE-2014-0457.html
   http://support.novell.com/security/cve/CVE-2014-0458.html
   http://support.novell.com/security/cve/CVE-2014-0459.html
   http://support.novell.com/security/cve/CVE-2014-0460.html
   http://support.novell.com/security/cve/CVE-2014-0461.html
   http://support.novell.com/security/cve/CVE-2014-1876.html
   http://support.novell.com/security/cve/CVE-2014-2397.html
   http://support.novell.com/security/cve/CVE-2014-2398.html
   http://support.novell.com/security/cve/CVE-2014-2402.html
   http://support.novell.com/security/cve/CVE-2014-2403.html
   http://support.novell.com/security/cve/CVE-2014-2412.html
   http://support.novell.com/security/cve/CVE-2014-2413.html
   http://support.novell.com/security/cve/CVE-2014-2414.html
   http://support.novell.com/security/cve/CVE-2014-2421.html
   http://support.novell.com/security/cve/CVE-2014-2423.html
   http://support.novell.com/security/cve/CVE-2014-2427.html
   https://bugzilla.novell.com/873873
   http://download.suse.com/patch/finder/?keywords=9e107d0028325fe6789728abca9fee1d



More information about the sle-updates mailing list