Security update for java-1_7_0-openjdk

SUSE Security Update: Security update for java-1_7_0-openjdk
Announcement ID: SUSE-SU-2013:1254-1
Rating: important
References: #828665
Affected Products:
  • SUSE Linux Enterprise Desktop 11 SP3

  • An update that fixes 30 vulnerabilities is now available.

    Description:


    This update to icedtea-2.4.1 fixes various security issues:

    * S6741606, CVE-2013-2407: Integrate Apache Santuario
    * S7158805, CVE-2013-2445: Better rewriting of nested
    subroutine calls
    * S7170730, CVE-2013-2451: Improve Windows network
    stack support.
    * S8000638, CVE-2013-2450: Improve deserialization
    * S8000642, CVE-2013-2446: Better handling of objects
    for transportation
    * S8001033, CVE-2013-2452: Refactor network address
    handling in virtual machine identifiers
    * S8001034, CVE-2013-1500: Memory management
    improvements
    * S8001038, CVE-2013-2444: Resourcefully handle
    resources
    * S8001318, CVE-2013-2447: Socket.getLocalAddress not
    consistent with InetAddress.getLocalHost
    * S8001330, CVE-2013-2443: Improve on checking order
    (non-Zero builds only)
    * S8003703, CVE-2013-2412: Update RMI connection dialog
    box
    * S8004288, CVE-2013-2449: (fs) Files.probeContentType
    problems
    * S8006328, CVE-2013-2448: Improve robustness of sound
    classes
    * S8007812, CVE-2013-2455: (reflect)
    Class.getEnclosingMethod problematic for some classes
    * S8008120, CVE-2013-2457: Improve JMX class checking
    * S8008124, CVE-2013-2453: Better compliance testing
    * S8008132, CVE-2013-2456: Better serialization support
    * S8008744, CVE-2013-2407: Rework part of fix for
    JDK-6741606
    * S8009057, CVE-2013-2448: Improve MIDI event handling
    * S8009071, CVE-2013-2459: Improve shape handling
    * S8009424, CVE-2013-2458: Adapt Nashorn to JSR-292
    implementation change
    * S8009554, CVE-2013-2454: Improve
    SerialJavaObject.getFields
    * S8010209, CVE-2013-2460: Better provision of factories
    * S8011243, CVE-2013-2470: Improve ImagingLib
    * S8011248, CVE-2013-2471: Better Component Rasters
    * S8011253, CVE-2013-2472: Better Short Component
    Rasters
    * S8011257, CVE-2013-2473: Better Byte Component Rasters
    * S8012375, CVE-2013-1571: Improve Javadoc framing
    * S8012438, CVE-2013-2463: Better image validation
    * S8012597, CVE-2013-2465: Better image channel
    verification
    * S8012601, CVE-2013-2469: Better validation of image
    layouts
    * S8014281, CVE-2013-2461: Better checking of XML
    signature

    Security Issue references:

    * CVE-2013-2407
    >
    * CVE-2013-2445
    >
    * CVE-2013-2451
    >
    * CVE-2013-2450
    >
    * CVE-2013-2446
    >
    * CVE-2013-2452
    >
    * CVE-2013-1500
    >
    * CVE-2013-2444
    >
    * CVE-2013-2447
    >
    * CVE-2013-2443
    >
    * CVE-2013-2412
    >
    * CVE-2013-2449
    >
    * CVE-2013-2448
    >
    * CVE-2013-2455
    >
    * CVE-2013-2457
    >
    * CVE-2013-2453
    >
    * CVE-2013-2456
    >
    * CVE-2013-2459
    >
    * CVE-2013-2458
    >
    * CVE-2013-2454
    >
    * CVE-2013-2460
    >
    * CVE-2013-2470
    >
    * CVE-2013-2471
    >
    * CVE-2013-2472
    >
    * CVE-2013-2473
    >
    * CVE-2013-1571
    >
    * CVE-2013-2463
    >
    * CVE-2013-2465
    >
    * CVE-2013-2469
    >
    * CVE-2013-2461
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Desktop 11 SP3:
      zypper in -t patch sledsp3-java-1_7_0-openjdk-8090

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
    • java-1_7_0-openjdk-1.7.0.6-0.19.2
    • java-1_7_0-openjdk-demo-1.7.0.6-0.19.2
    • java-1_7_0-openjdk-devel-1.7.0.6-0.19.2

    References:

    • http://support.novell.com/security/cve/CVE-2013-1500.html
    • http://support.novell.com/security/cve/CVE-2013-1571.html
    • http://support.novell.com/security/cve/CVE-2013-2407.html
    • http://support.novell.com/security/cve/CVE-2013-2412.html
    • http://support.novell.com/security/cve/CVE-2013-2443.html
    • http://support.novell.com/security/cve/CVE-2013-2444.html
    • http://support.novell.com/security/cve/CVE-2013-2445.html
    • http://support.novell.com/security/cve/CVE-2013-2446.html
    • http://support.novell.com/security/cve/CVE-2013-2447.html
    • http://support.novell.com/security/cve/CVE-2013-2448.html
    • http://support.novell.com/security/cve/CVE-2013-2449.html
    • http://support.novell.com/security/cve/CVE-2013-2450.html
    • http://support.novell.com/security/cve/CVE-2013-2451.html
    • http://support.novell.com/security/cve/CVE-2013-2452.html
    • http://support.novell.com/security/cve/CVE-2013-2453.html
    • http://support.novell.com/security/cve/CVE-2013-2454.html
    • http://support.novell.com/security/cve/CVE-2013-2455.html
    • http://support.novell.com/security/cve/CVE-2013-2456.html
    • http://support.novell.com/security/cve/CVE-2013-2457.html
    • http://support.novell.com/security/cve/CVE-2013-2458.html
    • http://support.novell.com/security/cve/CVE-2013-2459.html
    • http://support.novell.com/security/cve/CVE-2013-2460.html
    • http://support.novell.com/security/cve/CVE-2013-2461.html
    • http://support.novell.com/security/cve/CVE-2013-2463.html
    • http://support.novell.com/security/cve/CVE-2013-2465.html
    • http://support.novell.com/security/cve/CVE-2013-2469.html
    • http://support.novell.com/security/cve/CVE-2013-2470.html
    • http://support.novell.com/security/cve/CVE-2013-2471.html
    • http://support.novell.com/security/cve/CVE-2013-2472.html
    • http://support.novell.com/security/cve/CVE-2013-2473.html
    • https://bugzilla.novell.com/828665
    • http://download.suse.com/patch/finder/?keywords=562c8781d83d70fa81f9b3c9c3f93137