Security update for java-1_7_0-openjdk, java-1_7_0-openjdk-bootstrap

Announcement ID: SUSE-SU-2015:0789-1
Rating: moderate
References:
Cross-References:
CVSS scores:
Affected Products:
  • SUSE Linux Enterprise Desktop 12
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Server for SAP Applications 12

An update that solves 11 vulnerabilities can now be installed.

Description:

OpenJDK was updated to 2.5.5 - OpenJdk 7u79 to fix security issues and bugs:

The following vulnerabilities were fixed:

  • CVE-2015-0458: Deployment: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
  • CVE-2015-0459: 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
  • CVE-2015-0460: Hotspot: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
  • CVE-2015-0469: 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
  • CVE-2015-0477: Beans: unauthenticated remote attackers could update, insert or delete some JAVA accessible data via multiple protocols
  • CVE-2015-0478: JCE: unauthenticated remote attackers could read some JAVA accessible data via multiple protocols
  • CVE-2015-0480: Tools: unauthenticated remote attackers could update, insert or delete some JAVA accessible data via multiple protocols and cause a partial denial of service (partial DOS)
  • CVE-2015-0484: JavaFX: unauthenticated remote attackers could read, update, insert or delete access some Java accessible data via multiple protocols and cause a partial denial of service (partial DOS).
  • CVE-2015-0488: JSSE: unauthenticated remote attackers could cause a partial denial of service (partial DOS).
  • CVE-2015-0491: 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
  • CVE-2015-0492: JavaFX: unauthenticated remote attackers could execute arbitrary code via multiple protocols.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Desktop 12
    zypper in -t patch SUSE-SLE-DESKTOP-12-2015-176=1
  • SUSE Linux Enterprise Server 12
    zypper in -t patch SUSE-SLE-SERVER-12-2015-176=1
  • SUSE Linux Enterprise Server for SAP Applications 12
    zypper in -t patch SUSE-SLE-SERVER-12-2015-176=1

Package List:

  • SUSE Linux Enterprise Desktop 12 (x86_64)
    • java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-15.1
    • java-1_7_0-openjdk-1.7.0.79-15.1
    • java-1_7_0-openjdk-debugsource-1.7.0.79-15.1
    • java-1_7_0-openjdk-debuginfo-1.7.0.79-15.1
    • java-1_7_0-openjdk-headless-1.7.0.79-15.1
  • SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64)
    • java-1_7_0-openjdk-devel-1.7.0.79-15.1
    • java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-15.1
    • java-1_7_0-openjdk-demo-1.7.0.79-15.1
    • java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-15.1
    • java-1_7_0-openjdk-1.7.0.79-15.1
    • java-1_7_0-openjdk-debugsource-1.7.0.79-15.1
    • java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-15.1
    • java-1_7_0-openjdk-debuginfo-1.7.0.79-15.1
    • java-1_7_0-openjdk-headless-1.7.0.79-15.1
  • SUSE Linux Enterprise Server for SAP Applications 12 (x86_64)
    • java-1_7_0-openjdk-devel-1.7.0.79-15.1
    • java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-15.1
    • java-1_7_0-openjdk-demo-1.7.0.79-15.1
    • java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-15.1
    • java-1_7_0-openjdk-1.7.0.79-15.1
    • java-1_7_0-openjdk-debugsource-1.7.0.79-15.1
    • java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-15.1
    • java-1_7_0-openjdk-debuginfo-1.7.0.79-15.1
    • java-1_7_0-openjdk-headless-1.7.0.79-15.1

References: