openSUSE Security Update: icedtea-web: Update to 1.2.1 (bnc#) ______________________________________________________________________________ Announcement ID: openSUSE-SU-2012:0981-1 Rating: important References: #773458 Cross-References: CVE-2012-3422 CVE-2012-3423 Affected Products: openSUSE 12.1 openSUSE 11.4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: - update to 1.2.1 (bnc#773458) - Security Updates * CVE-2012-3422, RH840592: Potential read from an uninitialized memory location * CVE-2012-3423, RH841345: Incorrect handling of not 0-terminated strings - NetX * PR898: signed applications with big jnlp-file doesn't start (webstart affect like "frozen") * PR811: javaws is not handling urls with spaces (and other characters needing encoding) correctly * 816592: icedtea-web not loading GeoGebra java applets in Firefox or Chrome - Plugin * PR863: Error passing strings to applet methods in Chromium * PR895: IcedTea-Web searches for missing classes on each loadClass or findClass * PR518: NPString.utf8characters not guaranteed to be nul-terminated - Common * RH838417: Disambiguate signed applet security prompt from certificate warning * RH838559: Disambiguate signed applet security prompt from certificate warning Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.1: zypper in -t patch openSUSE-2012-512 - openSUSE 11.4: zypper in -t patch openSUSE-2012-512 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.1 (i586 x86_64): icedtea-web-1.2.1-6.1 icedtea-web-debuginfo-1.2.1-6.1 icedtea-web-debugsource-1.2.1-6.1 - openSUSE 12.1 (noarch): icedtea-web-javadoc-1.2.1-6.1 - openSUSE 11.4 (i586 x86_64): icedtea-web-1.2.1-0.13.1 icedtea-web-debuginfo-1.2.1-0.13.1 icedtea-web-debugsource-1.2.1-0.13.1 - openSUSE 11.4 (noarch): icedtea-web-javadoc-1.2.1-0.13.1 References: http://support.novell.com/security/cve/CVE-2012-3422.html http://support.novell.com/security/cve/CVE-2012-3423.html https://bugzilla.novell.com/773458