Otklonjene su brojne sigurnosne ranjivosti u paketu java-1.6.0-openjdk. Zlonamjerni napadači mogu ih iskoristiti za kompromitaciju povjerljivosti, integriteta i dostupnosti putem nepoznatih vektora.
Paket:
java-1.6.0-openjdk
Operacijski sustavi:
openSUSE 11.4, openSUSE 12.1
Kritičnost:
10
Problem:
nespecificirana pogreška, pogreška u programskoj komponenti
openSUSE Security Update: java-1_6_0-openjdk: critical
______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0828-1
Rating: critical
References: #766802
Cross-References: CVE-2012-1711 CVE-2012-1713 CVE-2012-1716
CVE-2012-1717 CVE-2012-1718 CVE-2012-1719
CVE-2012-1723 CVE-2012-1724 CVE-2012-1725
Affected Products:
openSUSE 12.1
openSUSE 11.4
______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
This version upgrade of java-1_6_0-openjdk fixes multiple
security flaws:
- S7079902, CVE-2012-1711: Refine CORBA data models
- S7143606, CVE-2012-1717: File.createTempFile should be
improved for temporary files created by the platform.
- S7143614, CVE-2012-1716: SynthLookAndFeel stability
improvement
- S7143617, CVE-2012-1713: Improve fontmanager layout
lookup operations
- S7143851, CVE-2012-1719: Improve IIOP stub and tie
generation in RMIC
- S7143872, CVE-2012-1718: Improve certificate extension
processing
- S7152811, CVE-2012-1723: Issues in client compiler
- S7157609, CVE-2012-1724: Issues with loop
- S7160757, CVE-2012-1725: Problem with hotspot
runtime_classfile
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.1:
zypper in -t patch openSUSE-2012-368
- openSUSE 11.4:
zypper in -t patch openSUSE-2012-368
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.1 (i586 x86_64):
java-1_6_0-openjdk-1.6.0.0_b24.1.11.3-6.2
java-1_6_0-openjdk-debuginfo-1.6.0.0_b24.1.11.3-6.2
java-1_6_0-openjdk-debugsource-1.6.0.0_b24.1.11.3-6.2
java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.3-6.2
java-1_6_0-openjdk-demo-debuginfo-1.6.0.0_b24.1.11.3-6.2
java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.3-6.2
java-1_6_0-openjdk-devel-debuginfo-1.6.0.0_b24.1.11.3-6.2
java-1_6_0-openjdk-javadoc-1.6.0.0_b24.1.11.3-6.2
java-1_6_0-openjdk-src-1.6.0.0_b24.1.11.3-6.2
- openSUSE 11.4 (i586 x86_64):
java-1_6_0-openjdk-1.6.0.0_b24.1.11.3-0.11.2
java-1_6_0-openjdk-debuginfo-1.6.0.0_b24.1.11.3-0.11.2
java-1_6_0-openjdk-debugsource-1.6.0.0_b24.1.11.3-0.11.2
java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.3-0.11.2
java-1_6_0-openjdk-demo-debuginfo-1.6.0.0_b24.1.11.3-0.11.2
java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.3-0.11.2
java-1_6_0-openjdk-devel-debuginfo-1.6.0.0_b24.1.11.3-0.11.2
java-1_6_0-openjdk-javadoc-1.6.0.0_b24.1.11.3-0.11.2
java-1_6_0-openjdk-src-1.6.0.0_b24.1.11.3-0.11.2
References:
http://support.novell.com/security/cve/CVE-2012-1711.html
http://support.novell.com/security/cve/CVE-2012-1713.html
http://support.novell.com/security/cve/CVE-2012-1716.html
http://support.novell.com/security/cve/CVE-2012-1717.html
http://support.novell.com/security/cve/CVE-2012-1718.html
http://support.novell.com/security/cve/CVE-2012-1719.html
http://support.novell.com/security/cve/CVE-2012-1723.html
http://support.novell.com/security/cve/CVE-2012-1724.html
http://support.novell.com/security/cve/CVE-2012-1725.html
https://bugzilla.novell.com/766802
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke