SUSE-SU-2012:1398-1: important: Security update for OpenJDK
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Wed Oct 24 14:08:43 MDT 2012
SUSE Security Update: Security update for OpenJDK
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:1398-1
Rating: important
References: #785433
Cross-References: CVE-2012-1531 CVE-2012-1532 CVE-2012-1533
CVE-2012-3143 CVE-2012-3159 CVE-2012-3216
CVE-2012-4416 CVE-2012-4681 CVE-2012-5067
CVE-2012-5068 CVE-2012-5069 CVE-2012-5070
CVE-2012-5071 CVE-2012-5072 CVE-2012-5073
CVE-2012-5074 CVE-2012-5075 CVE-2012-5076
CVE-2012-5077 CVE-2012-5078 CVE-2012-5079
CVE-2012-5080 CVE-2012-5081 CVE-2012-5082
CVE-2012-5083 CVE-2012-5084 CVE-2012-5085
CVE-2012-5086 CVE-2012-5087 CVE-2012-5088
CVE-2012-5089
Affected Products:
SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________
An update that fixes 31 vulnerabilities is now available.
Description:
java-openjdk was upgraded to version 1.11.5 to fix various
security and non-security issues.
Security Issue references:
* CVE-2012-4681
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4681
>
* CVE-2012-5083
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5083
>
* CVE-2012-1531
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1531
>
* CVE-2012-5086
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5086
>
* CVE-2012-5087
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5087
>
* CVE-2012-1533
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1533
>
* CVE-2012-1532
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1532
>
* CVE-2012-5076
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5076
>
* CVE-2012-3143
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3143
>
* CVE-2012-5088
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5088
>
* CVE-2012-5078
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5078
>
* CVE-2012-5089
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5089
>
* CVE-2012-5084
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5084
>
* CVE-2012-5080
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5080
>
* CVE-2012-3159
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3159
>
* CVE-2012-5068
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5068
>
* CVE-2012-4416
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4416
>
* CVE-2012-5074
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5074
>
* CVE-2012-5071
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5071
>
* CVE-2012-5069
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5069
>
* CVE-2012-5067
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5067
>
* CVE-2012-5070
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5070
>
* CVE-2012-5075
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5075
>
* CVE-2012-5073
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5073
>
* CVE-2012-5079
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5079
>
* CVE-2012-5072
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5072
>
* CVE-2012-5081
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5081
>
* CVE-2012-5082
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5082
>
* CVE-2012-3216
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3216
>
* CVE-2012-5077
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5077
>
* CVE-2012-5085
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5085
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-java-1_6_0-openjdk-6987
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1
java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1
java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1
References:
http://support.novell.com/security/cve/CVE-2012-1531.html
http://support.novell.com/security/cve/CVE-2012-1532.html
http://support.novell.com/security/cve/CVE-2012-1533.html
http://support.novell.com/security/cve/CVE-2012-3143.html
http://support.novell.com/security/cve/CVE-2012-3159.html
http://support.novell.com/security/cve/CVE-2012-3216.html
http://support.novell.com/security/cve/CVE-2012-4416.html
http://support.novell.com/security/cve/CVE-2012-4681.html
http://support.novell.com/security/cve/CVE-2012-5067.html
http://support.novell.com/security/cve/CVE-2012-5068.html
http://support.novell.com/security/cve/CVE-2012-5069.html
http://support.novell.com/security/cve/CVE-2012-5070.html
http://support.novell.com/security/cve/CVE-2012-5071.html
http://support.novell.com/security/cve/CVE-2012-5072.html
http://support.novell.com/security/cve/CVE-2012-5073.html
http://support.novell.com/security/cve/CVE-2012-5074.html
http://support.novell.com/security/cve/CVE-2012-5075.html
http://support.novell.com/security/cve/CVE-2012-5076.html
http://support.novell.com/security/cve/CVE-2012-5077.html
http://support.novell.com/security/cve/CVE-2012-5078.html
http://support.novell.com/security/cve/CVE-2012-5079.html
http://support.novell.com/security/cve/CVE-2012-5080.html
http://support.novell.com/security/cve/CVE-2012-5081.html
http://support.novell.com/security/cve/CVE-2012-5082.html
http://support.novell.com/security/cve/CVE-2012-5083.html
http://support.novell.com/security/cve/CVE-2012-5084.html
http://support.novell.com/security/cve/CVE-2012-5085.html
http://support.novell.com/security/cve/CVE-2012-5086.html
http://support.novell.com/security/cve/CVE-2012-5087.html
http://support.novell.com/security/cve/CVE-2012-5088.html
http://support.novell.com/security/cve/CVE-2012-5089.html
https://bugzilla.novell.com/785433
http://download.novell.com/patch/finder/?keywords=c230e2b1023ded8fd1041aa18bc26a60
More information about the sle-security-updates
mailing list