openSUSE Security Update: java-1_6_0-openjdk: critical ______________________________________________________________________________ Announcement ID: openSUSE-SU-2012:0828-1 Rating: critical References: #766802 Cross-References: CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 Affected Products: openSUSE 12.1 openSUSE 11.4 ______________________________________________________________________________ An update that fixes 9 vulnerabilities is now available. Description: This version upgrade of java-1_6_0-openjdk fixes multiple security flaws: - S7079902, CVE-2012-1711: Refine CORBA data models - S7143606, CVE-2012-1717: File.createTempFile should be improved for temporary files created by the platform. - S7143614, CVE-2012-1716: SynthLookAndFeel stability improvement - S7143617, CVE-2012-1713: Improve fontmanager layout lookup operations - S7143851, CVE-2012-1719: Improve IIOP stub and tie generation in RMIC - S7143872, CVE-2012-1718: Improve certificate extension processing - S7152811, CVE-2012-1723: Issues in client compiler - S7157609, CVE-2012-1724: Issues with loop - S7160757, CVE-2012-1725: Problem with hotspot runtime_classfile Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.1: zypper in -t patch openSUSE-2012-368 - openSUSE 11.4: zypper in -t patch openSUSE-2012-368 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.1 (i586 x86_64): java-1_6_0-openjdk-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-debuginfo-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-debugsource-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-demo-debuginfo-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-devel-debuginfo-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-javadoc-1.6.0.0_b24.1.11.3-6.2 java-1_6_0-openjdk-src-1.6.0.0_b24.1.11.3-6.2 - openSUSE 11.4 (i586 x86_64): java-1_6_0-openjdk-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-debuginfo-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-debugsource-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-demo-debuginfo-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-devel-debuginfo-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-javadoc-1.6.0.0_b24.1.11.3-0.11.2 java-1_6_0-openjdk-src-1.6.0.0_b24.1.11.3-0.11.2 References: http://support.novell.com/security/cve/CVE-2012-1711.html http://support.novell.com/security/cve/CVE-2012-1713.html http://support.novell.com/security/cve/CVE-2012-1716.html http://support.novell.com/security/cve/CVE-2012-1717.html http://support.novell.com/security/cve/CVE-2012-1718.html http://support.novell.com/security/cve/CVE-2012-1719.html http://support.novell.com/security/cve/CVE-2012-1723.html http://support.novell.com/security/cve/CVE-2012-1724.html http://support.novell.com/security/cve/CVE-2012-1725.html https://bugzilla.novell.com/766802