Mailinglist Archive: opensuse-updates (108 mails)

< Previous Next >
openSUSE-SU-2014:0174-1: moderate: update for java-1_7_0-openjdk
openSUSE Security Update: update for java-1_7_0-openjdk
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0174-1
Rating: moderate
References: #858818
Cross-References: CVE-2013-5878 CVE-2013-5884 CVE-2013-5893
CVE-2013-5896 CVE-2013-5907 CVE-2013-5910
CVE-2014-0368 CVE-2014-0373 CVE-2014-0376
CVE-2014-0408 CVE-2014-0411 CVE-2014-0416
CVE-2014-0422 CVE-2014-0423 CVE-2014-0428

Affected Products:
openSUSE 13.1
______________________________________________________________________________

An update that fixes 15 vulnerabilities is now available.

Description:

- Fix a file conflict between -devel and -headless package

- Update to 2.4.4 (bnc#858818)
* changed from xz to gzipped tarball as the first was not
available during update
* changed a keyring file due release manager change new
one is signed by 66484681 from omajid@xxxxxxxxxx, see
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2014-J
anuary/025800.html
* Security fixes
- S6727821: Enhance JAAS Configuration
- S7068126, CVE-2014-0373: Enhance SNMP statuses
- S8010935: Better XML handling
- S8011786, CVE-2014-0368: Better applet networking
- S8021257, S8025022, CVE-2013-5896 : com.sun.corba.se.**
should be on restricted package list
- S8021271, S8021266, CVE-2014-0408: Better buffering in
ObjC code
- S8022904: Enhance JDBC Parsers
- S8022927: Input validation for byte/endian conversions
- S8022935: Enhance Apache resolver classes
- S8022945: Enhance JNDI implementation classes
- S8023057: Enhance start up image display
- S8023069, CVE-2014-0411: Enhance TLS connections
- S8023245, CVE-2014-0423: Enhance Beans decoding
- S8023301: Enhance generic classes
- S8023338: Update jarsigner to encourage timestamping
- S8023672: Enhance jar file validation
- S8024302: Clarify jar verifications
- S8024306, CVE-2014-0416: Enhance Subject consistency
- S8024530: Enhance font process resilience
- S8024867: Enhance logging start up
- S8025014: Enhance Security Policy
- S8025018, CVE-2014-0376: Enhance JAX-P set up
- S8025026, CVE-2013-5878: Enhance canonicalization
- S8025034, CVE-2013-5907: Improve layout lookups
- S8025448: Enhance listening events
- S8025758, CVE-2014-0422: Enhance Naming management
- S8025767, CVE-2014-0428: Enhance IIOP Streams
- S8026172: Enhance UI Management
- S8026176: Enhance document printing
- S8026193, CVE-2013-5884: Enhance CORBA stub factories
- S8026204: Enhance auth login contexts
- S8026417, CVE-2013-5910: Enhance XML canonicalization
- S8026502: java/lang/invoke/MethodHandleConstants.java
fails on all platforms
- S8027201, CVE-2014-0376: Enhance JAX-P set up
- S8029507, CVE-2013-5893: Enhance JVM method processing
- S8029533: REGRESSION:
closed/java/lang/invoke/8008140/Test8008140.java fails
agains
* Backports
- S8025255: (tz) Support tzdata2013g
- S8026826: JDK 7 fix for 8010935 broke the build
* Bug fixes
- PR1618: Include defs.make in vm.make so
VM_LITTLE_ENDIAN is defined on Zero builds
- D729448: 32-bit alignment on mips and mipsel
- PR1623: Collision between OpenJDK 6 & 7 classes when
bootstrapping with OpenJDK 6
- Add update.py, helper script to download openjdk tarballs
from hg repo

- Buildrequire quilt unconditionally as it's used
unconditionally.
- Really disable tests on non-JIT architectures. (from
Ulrich Weigand)

- Add headless subpackage wich does not require X and
pulse/alsa
- Add accessibility to extra subpackage, which requires new
java-atk-wrapper package
* removed java-1.7.0-openjdk-java-access-bridge-idlj.patch
* removed java-1.7.0-openjdk-java-access-bridge-tck.patch
* removed java-access-bridge-1.26.2.tar.bz2
- Refreshed
* java-1.7.0-openjdk-java-access-bridge-security.patch
- Add a support for running tests using --with tests
* this is ignored on non-jit architectures
- Prefer global over define as bcond_with does use them
- Forward declare aarch64 arch macro
- Define archbuild/archinstall macros for arm and aarch64
* remove a few ifarch conditions by using those macros in
filelist

- Need ecj-bootstrap in bootstrap mode (noted by mmatz)
- Don't install vim and quilt in bootstrap mode

- A few enhancenments of bootstrap mode
* usable wia --with bootstrap
* disable docs, javadoc package
* fix configure arguments on bootstrap

- Add the unversioned SDK directory link to the files list
of -devel package (fixes update-alternatives from %post).

- Add support for bootstrapping with just gcj (using
included ecj directly). Increase stacksize for powerpc
(amends java-1.7.0-openjdk-ppc-zero-jdk.patch). Add
support for ppc64le.

- fix stackoverflow for powerpc
(java-1_7_0-openjdk-ppc-stackoverflow.patch)


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.1:

zypper in -t patch openSUSE-2014-95

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.1 (i586 x86_64):

java-1_7_0-openjdk-1.7.0.6-24.13.5
java-1_7_0-openjdk-accessibility-1.7.0.6-24.13.5
java-1_7_0-openjdk-debuginfo-1.7.0.6-24.13.5
java-1_7_0-openjdk-debugsource-1.7.0.6-24.13.5
java-1_7_0-openjdk-demo-1.7.0.6-24.13.5
java-1_7_0-openjdk-demo-debuginfo-1.7.0.6-24.13.5
java-1_7_0-openjdk-devel-1.7.0.6-24.13.5
java-1_7_0-openjdk-devel-debuginfo-1.7.0.6-24.13.5
java-1_7_0-openjdk-headless-1.7.0.6-24.13.5
java-1_7_0-openjdk-headless-debuginfo-1.7.0.6-24.13.5
java-1_7_0-openjdk-javadoc-1.7.0.6-24.13.5
java-1_7_0-openjdk-src-1.7.0.6-24.13.5


References:

http://support.novell.com/security/cve/CVE-2013-5878.html
http://support.novell.com/security/cve/CVE-2013-5884.html
http://support.novell.com/security/cve/CVE-2013-5893.html
http://support.novell.com/security/cve/CVE-2013-5896.html
http://support.novell.com/security/cve/CVE-2013-5907.html
http://support.novell.com/security/cve/CVE-2013-5910.html
http://support.novell.com/security/cve/CVE-2014-0368.html
http://support.novell.com/security/cve/CVE-2014-0373.html
http://support.novell.com/security/cve/CVE-2014-0376.html
http://support.novell.com/security/cve/CVE-2014-0408.html
http://support.novell.com/security/cve/CVE-2014-0411.html
http://support.novell.com/security/cve/CVE-2014-0416.html
http://support.novell.com/security/cve/CVE-2014-0422.html
http://support.novell.com/security/cve/CVE-2014-0423.html
http://support.novell.com/security/cve/CVE-2014-0428.html
https://bugzilla.novell.com/858818


< Previous Next >
This Thread
  • No further messages