SuSE: 2009-001: Sun Java Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: Sun Java
Announcement ID: SUSE-SA:2009:001
Date: Fri, 09 Jan 2009 15:00:00 +0000
Affected Products: openSUSE 10.3
openSUSE 11.0
openSUSE 11.1
SUSE SLES 9
Novell Linux Desktop 9
Open Enterprise Server
Novell Linux POS 9
SUSE Linux Enterprise Desktop 10 SP2
SUSE Linux Enterprise Server 10 SP2
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2008-2086, CVE-2008-5339, CVE-2008-5340
CVE-2008-5341, CVE-2008-5342, CVE-2008-5343
CVE-2008-5344, CVE-2008-5345, CVE-2008-5346
CVE-2008-5347, CVE-2008-5348, CVE-2008-5349
CVE-2008-5350, CVE-2008-5351, CVE-2008-5352
CVE-2008-5353, CVE-2008-5354, CVE-2008-5355
CVE-2008-5356, CVE-2008-5357, CVE-2008-5358
CVE-2008-5359, CVE-2008-5360
Content of This Advisory:
1) Security Vulnerability Resolved:
Various Sun Java security issues
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
Sun Java received several security fixes and was updated to:
- Sun Java 1.6.0 to Update 11-b03
- Sun Java 1.5.0 to Update 17
- Sun Java 1.4.2 to Update 19
Numerous security issues such as privilege escalations, and sandbox
breakouts were fixed.
(CVE-2008-5360, CVE-2008-5359, CVE-2008-5358, CVE-2008-5357,
CVE-2008-5356, CVE-2008-5344, CVE-2008-5343, CVE-2008-5342,
CVE-2008-5341, CVE-2008-5340, CVE-2008-5339, CVE-2008-2086,
CVE-2008-5355, CVE-2008-5354, CVE-2008-5353, CVE-2008-5352,
CVE-2008-5351, CVE-2008-5350, CVE-2008-5349, CVE-2008-5348,
CVE-2008-5347, CVE-2008-5345, CVE-2008-5346)
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please close and restart all running instances of Java using programs after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
References