Security update for OpenJDK
Announcement ID: | SUSE-SU-2012:1398-1 |
Rating: | important |
References: | #785433 |
Affected Products: |
An update that fixes 31 vulnerabilities is now available.
Description:
java-openjdk was upgraded to version 1.11.5 to fix various
security and non-security issues.
Security Issue references:
* CVE-2012-4681
* CVE-2012-5083
* CVE-2012-1531
* CVE-2012-5086
* CVE-2012-5087
* CVE-2012-1533
* CVE-2012-1532
* CVE-2012-5076
* CVE-2012-3143
* CVE-2012-5088
* CVE-2012-5078
* CVE-2012-5089
* CVE-2012-5084
* CVE-2012-5080
* CVE-2012-3159
* CVE-2012-5068
* CVE-2012-4416
* CVE-2012-5074
* CVE-2012-5071
* CVE-2012-5069
* CVE-2012-5067
* CVE-2012-5070
* CVE-2012-5075
* CVE-2012-5073
* CVE-2012-5079
* CVE-2012-5072
* CVE-2012-5081
* CVE-2012-5082
* CVE-2012-3216
* CVE-2012-5077
* CVE-2012-5085
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-java-1_6_0-openjdk-6987
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
- java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1
- java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1
- java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1
References:
- http://support.novell.com/security/cve/CVE-2012-1531.html
- http://support.novell.com/security/cve/CVE-2012-1532.html
- http://support.novell.com/security/cve/CVE-2012-1533.html
- http://support.novell.com/security/cve/CVE-2012-3143.html
- http://support.novell.com/security/cve/CVE-2012-3159.html
- http://support.novell.com/security/cve/CVE-2012-3216.html
- http://support.novell.com/security/cve/CVE-2012-4416.html
- http://support.novell.com/security/cve/CVE-2012-4681.html
- http://support.novell.com/security/cve/CVE-2012-5067.html
- http://support.novell.com/security/cve/CVE-2012-5068.html
- http://support.novell.com/security/cve/CVE-2012-5069.html
- http://support.novell.com/security/cve/CVE-2012-5070.html
- http://support.novell.com/security/cve/CVE-2012-5071.html
- http://support.novell.com/security/cve/CVE-2012-5072.html
- http://support.novell.com/security/cve/CVE-2012-5073.html
- http://support.novell.com/security/cve/CVE-2012-5074.html
- http://support.novell.com/security/cve/CVE-2012-5075.html
- http://support.novell.com/security/cve/CVE-2012-5076.html
- http://support.novell.com/security/cve/CVE-2012-5077.html
- http://support.novell.com/security/cve/CVE-2012-5078.html
- http://support.novell.com/security/cve/CVE-2012-5079.html
- http://support.novell.com/security/cve/CVE-2012-5080.html
- http://support.novell.com/security/cve/CVE-2012-5081.html
- http://support.novell.com/security/cve/CVE-2012-5082.html
- http://support.novell.com/security/cve/CVE-2012-5083.html
- http://support.novell.com/security/cve/CVE-2012-5084.html
- http://support.novell.com/security/cve/CVE-2012-5085.html
- http://support.novell.com/security/cve/CVE-2012-5086.html
- http://support.novell.com/security/cve/CVE-2012-5087.html
- http://support.novell.com/security/cve/CVE-2012-5088.html
- http://support.novell.com/security/cve/CVE-2012-5089.html
- https://bugzilla.novell.com/785433
- http://download.suse.com/patch/finder/?keywords=c230e2b1023ded8fd1041aa18bc26a60