Security update for OpenJDK 1.6

SUSE Security Update: Security update for OpenJDK 1.6
Announcement ID: SUSE-SU-2013:1808-1
Rating: moderate
References: #852367
Affected Products:
  • SUSE Linux Enterprise Desktop 11 SP2

  • An update that fixes 27 vulnerabilities is now available.

    Description:


    OpenJDK 1.6 was updated to the new Icedtea release 1.12.7,
    which includes many fixes for bugs and security issues:

    * S8006900, CVE-2013-3829: Add new date/time capability
    * S8008589: Better MBean permission validation
    * S8011071, CVE-2013-5780: Better crypto provider
    handling
    * S8011081, CVE-2013-5772: Improve jhat
    * S8011157, CVE-2013-5814: Improve CORBA portablility
    * S8012071, CVE-2013-5790: Better Building of Beans
    * S8012147: Improve tool support
    * S8012277: CVE-2013-5849: Improve AWT DataFlavor
    * S8012425, CVE-2013-5802: Transform TransformerFactory
    * S8013503, CVE-2013-5851: Improve stream factories
    * S8013506: Better Pack200 data handling
    * S8013510, CVE-2013-5809: Augment image writing code
    * S8013514: Improve stability of cmap class
    * S8013739, CVE-2013-5817: Better LDAP resource
    management
    * S8013744, CVE-2013-5783: Better tabling for AWT
    * S8014085: Better serialization support in JMX classes
    * S8014093, CVE-2013-5782: Improve parsing of images
    * S8014102, CVE-2013-5778: Improve image conversion
    * S8014341, CVE-2013-5803: Better service from Kerberos
    servers
    * S8014349, CVE-2013-5840: (cl) Class.getDeclaredClass
    problematic in some class loader configurations
    * S8014530, CVE-2013-5825: Better digital signature
    processing
    * S8014534: Better profiling support
    * S8014987, CVE-2013-5842: Augment serialization
    handling
    * S8015614: Update build settings
    * S8015731: Subject java.security.auth.subject to
    improvements
    * S8015743, CVE-2013-5774: Address internet addresses
    * S8016256: Make finalization final
    * S8016653, CVE-2013-5804: javadoc should ignore
    ignoreable characters in names
    * S8016675, CVE-2013-5797: Make Javadoc pages more
    robust
    * S8017196, CVE-2013-5850: Ensure Proxies are handled
    appropriately
    * S8017287, CVE-2013-5829: Better resource disposal
    * S8017291, CVE-2013-5830: Cast Proxies Aside
    * S8017298, CVE-2013-4002: Better XML support
    * S8017300, CVE-2013-5784: Improve Interface
    Implementation
    * S8017505, CVE-2013-5820: Better Client Service
    * S8019292: Better Attribute Value Exceptions
    * S8019617: Better view of objects
    * S8020293: JVM crash
    * S8021290, CVE-2013-5823: Better signature validation
    * S8022940: Enhance CORBA translations
    * S8023683: Enhance class file parsing

    Security issue references:

    * CVE-2013-3829
    >
    * CVE-2013-5780
    >
    * CVE-2013-5772
    >
    * CVE-2013-5814
    >
    * CVE-2013-5790
    >
    * CVE-2013-5849
    >
    * CVE-2013-5802
    >
    * CVE-2013-5851
    >
    * CVE-2013-5809
    >
    * CVE-2013-5817
    >
    * CVE-2013-5783
    >
    * CVE-2013-5782
    >
    * CVE-2013-5778
    >
    * CVE-2013-5803
    >
    * CVE-2013-5840
    >
    * CVE-2013-5825
    >
    * CVE-2013-5842
    >
    * CVE-2013-5774
    >
    * CVE-2013-5804
    >
    * CVE-2013-5797
    >
    * CVE-2013-5850
    >
    * CVE-2013-5829
    >
    * CVE-2013-5830
    >
    * CVE-2013-4002
    >
    * CVE-2013-5784
    >
    * CVE-2013-5820
    >
    * CVE-2013-5823
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Desktop 11 SP2:
      zypper in -t patch sledsp2-java-1_6_0-openjdk-8598

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
    • java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1
    • java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1
    • java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1

    References:

    • http://support.novell.com/security/cve/CVE-2013-3829.html
    • http://support.novell.com/security/cve/CVE-2013-4002.html
    • http://support.novell.com/security/cve/CVE-2013-5772.html
    • http://support.novell.com/security/cve/CVE-2013-5774.html
    • http://support.novell.com/security/cve/CVE-2013-5778.html
    • http://support.novell.com/security/cve/CVE-2013-5780.html
    • http://support.novell.com/security/cve/CVE-2013-5782.html
    • http://support.novell.com/security/cve/CVE-2013-5783.html
    • http://support.novell.com/security/cve/CVE-2013-5784.html
    • http://support.novell.com/security/cve/CVE-2013-5790.html
    • http://support.novell.com/security/cve/CVE-2013-5797.html
    • http://support.novell.com/security/cve/CVE-2013-5802.html
    • http://support.novell.com/security/cve/CVE-2013-5803.html
    • http://support.novell.com/security/cve/CVE-2013-5804.html
    • http://support.novell.com/security/cve/CVE-2013-5809.html
    • http://support.novell.com/security/cve/CVE-2013-5814.html
    • http://support.novell.com/security/cve/CVE-2013-5817.html
    • http://support.novell.com/security/cve/CVE-2013-5820.html
    • http://support.novell.com/security/cve/CVE-2013-5823.html
    • http://support.novell.com/security/cve/CVE-2013-5825.html
    • http://support.novell.com/security/cve/CVE-2013-5829.html
    • http://support.novell.com/security/cve/CVE-2013-5830.html
    • http://support.novell.com/security/cve/CVE-2013-5840.html
    • http://support.novell.com/security/cve/CVE-2013-5842.html
    • http://support.novell.com/security/cve/CVE-2013-5849.html
    • http://support.novell.com/security/cve/CVE-2013-5850.html
    • http://support.novell.com/security/cve/CVE-2013-5851.html
    • https://bugzilla.novell.com/852367
    • http://download.suse.com/patch/finder/?keywords=f9bc9e92927bdfde8cd5a58a25ff1f63