openSUSE Security Update : java-1_7_0-openjdk (openSUSE-SU-2013:0199-1)

Critical Nessus Plugin ID 75022


The remote openSUSE host is missing a security update.


java-1_7_0-openjdk was updated to icedtea-2.3.4 fixing bugs and also severe security issues :

- Security fixes

- S8004933, CVE-2012-3174: Improve MethodHandle interaction with libraries

- S8006017, CVE-2013-0422: Improve lookup resolutions

- S8006125: Update MethodHandles library interactions

- Bug fixes

- S7197906: BlockOffsetArray::power_to_cards_back() needs to handle > 32 bit shifts

- G422525: Fix building with PaX enabled kernels.

- use gpg-offline to check the validity of icedtea tarball

- use jamvm on %arm

- use icedtea package name instead of protected openjdk for jamvm builds

- fix armv5 build

- update to java access bridge 1.26.2

- bugfix release, mainly 64bit JNI and JVM support

- fix a segfault in AWT code - (bnc#792951)

- add openjdk-7-src-b147-awt-crasher.patch

- turn pulseaudio off on pre 11.4 distros


Update the affected java-1_7_0-openjdk packages.

See Also

Plugin Details

Severity: Critical

ID: 75022

File Name: openSUSE-2013-47.nasl

Version: $Revision: 1.2 $

Type: local

Agent: unix

Published: 2014/06/13

Modified: 2015/08/06

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:java-1_7_0-openjdk, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-debugsource, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-demo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-demo-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-devel, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-devel-debuginfo, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-javadoc, p-cpe:/a:novell:opensuse:java-1_7_0-openjdk-src, cpe:/o:novell:opensuse:12.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/01/18

Exploitable With


Core Impact

Metasploit (Java Applet JMX Remote Code Execution)

Reference Information

CVE: CVE-2012-3174, CVE-2013-0422

OSVDB: 89059, 89326