Security update for OpenJDK 7

SUSE Security Update: Security update for OpenJDK 7
Announcement ID: SUSE-SU-2013:1666-1
Rating: important
References: #846999
Affected Products:
  • SUSE Linux Enterprise Desktop 11 SP3

  • An update that fixes 30 vulnerabilities is now available.

    Description:


    This release updates our OpenJDK 7 support in the 2.4.x
    series with a number of security fixes and synchronises it
    with upstream development. The security issues fixed (a
    long list) can be found in the following link:

    http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-O
    ctober/025087.html
    October/025087.html>

    Security Issue references:

    * CVE-2013-3829
    >
    * CVE-2013-5780
    >
    * CVE-2013-5772
    >
    * CVE-2013-5814
    >
    * CVE-2013-5790
    >
    * CVE-2013-5849
    >
    * CVE-2013-5802
    >
    * CVE-2013-5851
    >
    * CVE-2013-5809
    >
    * CVE-2013-5817
    >
    * CVE-2013-5783
    >
    * CVE-2013-5782
    >
    * CVE-2013-5778
    >
    * CVE-2013-5803
    >
    * CVE-2013-5840
    >
    * CVE-2013-5825
    >
    * CVE-2013-5842
    >
    * CVE-2013-5774
    >
    * CVE-2013-5804
    >
    * CVE-2013-5797
    >
    * CVE-2013-5850
    >
    * CVE-2013-5829
    >
    * CVE-2013-5830
    >
    * CVE-2013-4002
    >
    * CVE-2013-5784
    >
    * CVE-2013-5820
    >
    * CVE-2013-5805
    >
    * CVE-2013-5806
    >
    * CVE-2013-5823
    >
    * CVE-2013-5800
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Desktop 11 SP3:
      zypper in -t patch sledsp3-java-1_7_0-openjdk-8494

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
    • java-1_7_0-openjdk-1.7.0.6-0.21.1
    • java-1_7_0-openjdk-demo-1.7.0.6-0.21.1
    • java-1_7_0-openjdk-devel-1.7.0.6-0.21.1

    References:

    • http://support.novell.com/security/cve/CVE-2013-3829.html
    • http://support.novell.com/security/cve/CVE-2013-4002.html
    • http://support.novell.com/security/cve/CVE-2013-5772.html
    • http://support.novell.com/security/cve/CVE-2013-5774.html
    • http://support.novell.com/security/cve/CVE-2013-5778.html
    • http://support.novell.com/security/cve/CVE-2013-5780.html
    • http://support.novell.com/security/cve/CVE-2013-5782.html
    • http://support.novell.com/security/cve/CVE-2013-5783.html
    • http://support.novell.com/security/cve/CVE-2013-5784.html
    • http://support.novell.com/security/cve/CVE-2013-5790.html
    • http://support.novell.com/security/cve/CVE-2013-5797.html
    • http://support.novell.com/security/cve/CVE-2013-5800.html
    • http://support.novell.com/security/cve/CVE-2013-5802.html
    • http://support.novell.com/security/cve/CVE-2013-5803.html
    • http://support.novell.com/security/cve/CVE-2013-5804.html
    • http://support.novell.com/security/cve/CVE-2013-5805.html
    • http://support.novell.com/security/cve/CVE-2013-5806.html
    • http://support.novell.com/security/cve/CVE-2013-5809.html
    • http://support.novell.com/security/cve/CVE-2013-5814.html
    • http://support.novell.com/security/cve/CVE-2013-5817.html
    • http://support.novell.com/security/cve/CVE-2013-5820.html
    • http://support.novell.com/security/cve/CVE-2013-5823.html
    • http://support.novell.com/security/cve/CVE-2013-5825.html
    • http://support.novell.com/security/cve/CVE-2013-5829.html
    • http://support.novell.com/security/cve/CVE-2013-5830.html
    • http://support.novell.com/security/cve/CVE-2013-5840.html
    • http://support.novell.com/security/cve/CVE-2013-5842.html
    • http://support.novell.com/security/cve/CVE-2013-5849.html
    • http://support.novell.com/security/cve/CVE-2013-5850.html
    • http://support.novell.com/security/cve/CVE-2013-5851.html
    • https://bugzilla.novell.com/846999
    • http://download.suse.com/patch/finder/?keywords=41b2667e06be42c5dcb1c022821e91ef