Lucene search

K
suseSuseSUSE-SU-2015:0833-1
HistoryMay 07, 2015 - 9:04 p.m.

Security update for java-1_7_0-openjdk (critical)

2015-05-0721:04:54
lists.opensuse.org
19

0.084 Low

EPSS

Percentile

94.4%

OpenJDK was updated to version 2.5.5 - OpenJDK 7u79 to fix security issues
and bugs.

The following vulnerabilities have been fixed:

   * CVE-2015-0458: Deployment: unauthenticated remote attackers could
     execute arbitrary code via multiple protocols.
   * CVE-2015-0459: 2D: unauthenticated remote attackers could execute
     arbitrary code via multiple protocols.
   * CVE-2015-0460: Hotspot: unauthenticated remote attackers could
     execute arbitrary code via multiple protocols.
   * CVE-2015-0469: 2D: unauthenticated remote attackers could execute
     arbitrary code via multiple protocols.
   * CVE-2015-0477: Beans: unauthenticated remote attackers could update,
     insert or delete some JAVA accessible data via multiple protocols
   * CVE-2015-0478: JCE: unauthenticated remote attackers could read some
     JAVA accessible data via multiple protocols
   * CVE-2015-0480: Tools: unauthenticated remote attackers could update,
     insert or delete some JAVA accessible data via multiple protocols
     and cause a partial denial of service (partial DOS)
   * CVE-2015-0484: JavaFX: unauthenticated remote attackers could read,
     update, insert or delete access some Java accessible data via
     multiple protocols and cause a partial denial of service (partial
     DOS).
   * CVE-2015-0488: JSSE: unauthenticated remote attackers could cause a
     partial denial of service (partial DOS).
   * CVE-2015-0491: 2D: unauthenticated remote attackers could execute
     arbitrary code via multiple protocols.
   * CVE-2015-0492: JavaFX: unauthenticated remote attackers could
     execute arbitrary code via multiple protocols.

Security Issues:

   * CVE-2015-0458
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0458">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0458</a>&gt;
   * CVE-2015-0459
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0459">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0459</a>&gt;
   * CVE-2015-0460
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460</a>&gt;
   * CVE-2015-0469
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469</a>&gt;
   * CVE-2015-0477
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477</a>&gt;
   * CVE-2015-0478
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478</a>&gt;
   * CVE-2015-0480
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480</a>&gt;
   * CVE-2015-0484
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0484">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0484</a>&gt;
   * CVE-2015-0488
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488</a>&gt;
   * CVE-2015-0491
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0491">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0491</a>&gt;
   * CVE-2015-0492
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0492">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0492</a>&gt;