Security update for OpenJDK

SUSE Security Update: Security update for OpenJDK
Announcement ID: SUSE-SU-2012:1398-1
Rating: important
References: #785433
Affected Products:
  • SUSE Linux Enterprise Desktop 11 SP2

  • An update that fixes 31 vulnerabilities is now available.

    Description:


    java-openjdk was upgraded to version 1.11.5 to fix various
    security and non-security issues.

    Security Issue references:

    * CVE-2012-4681
    >
    * CVE-2012-5083
    >
    * CVE-2012-1531
    >
    * CVE-2012-5086
    >
    * CVE-2012-5087
    >
    * CVE-2012-1533
    >
    * CVE-2012-1532
    >
    * CVE-2012-5076
    >
    * CVE-2012-3143
    >
    * CVE-2012-5088
    >
    * CVE-2012-5078
    >
    * CVE-2012-5089
    >
    * CVE-2012-5084
    >
    * CVE-2012-5080
    >
    * CVE-2012-3159
    >
    * CVE-2012-5068
    >
    * CVE-2012-4416
    >
    * CVE-2012-5074
    >
    * CVE-2012-5071
    >
    * CVE-2012-5069
    >
    * CVE-2012-5067
    >
    * CVE-2012-5070
    >
    * CVE-2012-5075
    >
    * CVE-2012-5073
    >
    * CVE-2012-5079
    >
    * CVE-2012-5072
    >
    * CVE-2012-5081
    >
    * CVE-2012-5082
    >
    * CVE-2012-3216
    >
    * CVE-2012-5077
    >
    * CVE-2012-5085
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Desktop 11 SP2:
      zypper in -t patch sledsp2-java-1_6_0-openjdk-6987

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
    • java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1
    • java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1
    • java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1

    References:

    • http://support.novell.com/security/cve/CVE-2012-1531.html
    • http://support.novell.com/security/cve/CVE-2012-1532.html
    • http://support.novell.com/security/cve/CVE-2012-1533.html
    • http://support.novell.com/security/cve/CVE-2012-3143.html
    • http://support.novell.com/security/cve/CVE-2012-3159.html
    • http://support.novell.com/security/cve/CVE-2012-3216.html
    • http://support.novell.com/security/cve/CVE-2012-4416.html
    • http://support.novell.com/security/cve/CVE-2012-4681.html
    • http://support.novell.com/security/cve/CVE-2012-5067.html
    • http://support.novell.com/security/cve/CVE-2012-5068.html
    • http://support.novell.com/security/cve/CVE-2012-5069.html
    • http://support.novell.com/security/cve/CVE-2012-5070.html
    • http://support.novell.com/security/cve/CVE-2012-5071.html
    • http://support.novell.com/security/cve/CVE-2012-5072.html
    • http://support.novell.com/security/cve/CVE-2012-5073.html
    • http://support.novell.com/security/cve/CVE-2012-5074.html
    • http://support.novell.com/security/cve/CVE-2012-5075.html
    • http://support.novell.com/security/cve/CVE-2012-5076.html
    • http://support.novell.com/security/cve/CVE-2012-5077.html
    • http://support.novell.com/security/cve/CVE-2012-5078.html
    • http://support.novell.com/security/cve/CVE-2012-5079.html
    • http://support.novell.com/security/cve/CVE-2012-5080.html
    • http://support.novell.com/security/cve/CVE-2012-5081.html
    • http://support.novell.com/security/cve/CVE-2012-5082.html
    • http://support.novell.com/security/cve/CVE-2012-5083.html
    • http://support.novell.com/security/cve/CVE-2012-5084.html
    • http://support.novell.com/security/cve/CVE-2012-5085.html
    • http://support.novell.com/security/cve/CVE-2012-5086.html
    • http://support.novell.com/security/cve/CVE-2012-5087.html
    • http://support.novell.com/security/cve/CVE-2012-5088.html
    • http://support.novell.com/security/cve/CVE-2012-5089.html
    • https://bugzilla.novell.com/785433
    • http://download.suse.com/patch/finder/?keywords=c230e2b1023ded8fd1041aa18bc26a60