Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2013:1257-1: important: Security update for java-1_7_0-ibm

Recommended Posts

SUSE Security Update: Security update for java-1_7_0-ibm

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2013:1257-1

Rating: important

References: #817062 #823034 #829212

Cross-References: CVE-2013-1500 CVE-2013-1571 CVE-2013-2400

CVE-2013-2407 CVE-2013-2412 CVE-2013-2437

CVE-2013-2442 CVE-2013-2443 CVE-2013-2444

CVE-2013-2446 CVE-2013-2447 CVE-2013-2448

CVE-2013-2449 CVE-2013-2450 CVE-2013-2451

CVE-2013-2452 CVE-2013-2453 CVE-2013-2454

CVE-2013-2455 CVE-2013-2456 CVE-2013-2457

CVE-2013-2458 CVE-2013-2459 CVE-2013-2460

CVE-2013-2462 CVE-2013-2463 CVE-2013-2464

CVE-2013-2465 CVE-2013-2466 CVE-2013-2468

CVE-2013-2469 CVE-2013-2470 CVE-2013-2471

CVE-2013-2472 CVE-2013-2473 CVE-2013-3006

CVE-2013-3007 CVE-2013-3008 CVE-2013-3009

CVE-2013-3010 CVE-2013-3011 CVE-2013-3012

CVE-2013-3743 CVE-2013-3744 CVE-2013-4002

 

Affected Products:

SUSE Linux Enterprise Software Development Kit 11 SP2

SUSE Linux Enterprise Server 11 SP2 for VMware

SUSE Linux Enterprise Server 11 SP2

SUSE Linux Enterprise Java 11 SP2

______________________________________________________________________________

 

An update that fixes 45 vulnerabilities is now available.

 

Description:

 

 

IBM Java 1.7.0 has been updated to SR5 to fix bugs and

security issues.

 

Please see also

http://www.ibm.com/developerworks/java/jdk/alerts/

 

 

Also the following bugs have been fixed:

 

* add Europe/Busingen to tzmappings (bnc#817062)

* mark files in jre/bin and bin/ as executable

(bnc#823034)

 

Security Issue references:

 

* CVE-2013-3006

 

* CVE-2013-3007

 

* CVE-2013-3008

 

* CVE-2013-3009

 

* CVE-2013-3010

 

* CVE-2013-3011

 

* CVE-2013-3012

 

* CVE-2013-4002

 

* CVE-2013-2468

 

* CVE-2013-2469

 

* CVE-2013-2465

 

* CVE-2013-2464

 

* CVE-2013-2463

 

* CVE-2013-2473

 

* CVE-2013-2472

 

* CVE-2013-2471

 

* CVE-2013-2470

 

* CVE-2013-2459

 

* CVE-2013-2466

 

* CVE-2013-2462

 

* CVE-2013-2460

 

* CVE-2013-3743

 

* CVE-2013-2448

 

* CVE-2013-2442

 

* CVE-2013-2407

 

* CVE-2013-2454

 

* CVE-2013-2458

 

* CVE-2013-3744

 

* CVE-2013-2400

 

* CVE-2013-2456

 

* CVE-2013-2453

 

* CVE-2013-2457

 

* CVE-2013-2455

 

* CVE-2013-2412

 

* CVE-2013-2443

 

* CVE-2013-2447

 

* CVE-2013-2437

 

* CVE-2013-2444

 

* CVE-2013-2452

 

* CVE-2013-2446

 

* CVE-2013-2450

 

* CVE-2013-1571

 

* CVE-2013-2449

 

* CVE-2013-2451

 

* CVE-2013-1500

 

 

 

Patch Instructions:

 

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- SUSE Linux Enterprise Software Development Kit 11 SP2:

 

zypper in -t patch sdksp2-java-1_7_0-ibm-8108

 

- SUSE Linux Enterprise Server 11 SP2 for VMware:

 

zypper in -t patch slessp2-java-1_7_0-ibm-8108

 

- SUSE Linux Enterprise Server 11 SP2:

 

zypper in -t patch slessp2-java-1_7_0-ibm-8108

 

- SUSE Linux Enterprise Java 11 SP2:

 

zypper in -t patch slejsp2-java-1_7_0-ibm-8108

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 s390x x86_64):

 

java-1_7_0-ibm-devel-1.7.0_sr5.0-0.5.1

 

- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

 

java-1_7_0-ibm-1.7.0_sr5.0-0.5.1

java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5.1

java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5.1

java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5.1

 

- SUSE Linux Enterprise Server 11 SP2 (i586 ppc64 s390x x86_64):

 

java-1_7_0-ibm-1.7.0_sr5.0-0.5.1

java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5.1

 

- SUSE Linux Enterprise Server 11 SP2 (i586 x86_64):

 

java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5.1

java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5.1

 

- SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64):

 

java-1_7_0-ibm-1.7.0_sr5.0-0.5.1

java-1_7_0-ibm-devel-1.7.0_sr5.0-0.5.1

java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5.1

 

- SUSE Linux Enterprise Java 11 SP2 (i586 x86_64):

 

java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5.1

java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5.1

 

 

References:

 

http://support.novell.com/security/cve/CVE-2013-1500.html

http://support.novell.com/security/cve/CVE-2013-1571.html

http://support.novell.com/security/cve/CVE-2013-2400.html

http://support.novell.com/security/cve/CVE-2013-2407.html

http://support.novell.com/security/cve/CVE-2013-2412.html

http://support.novell.com/security/cve/CVE-2013-2437.html

http://support.novell.com/security/cve/CVE-2013-2442.html

http://support.novell.com/security/cve/CVE-2013-2443.html

http://support.novell.com/security/cve/CVE-2013-2444.html

http://support.novell.com/security/cve/CVE-2013-2446.html

http://support.novell.com/security/cve/CVE-2013-2447.html

http://support.novell.com/security/cve/CVE-2013-2448.html

http://support.novell.com/security/cve/CVE-2013-2449.html

http://support.novell.com/security/cve/CVE-2013-2450.html

http://support.novell.com/security/cve/CVE-2013-2451.html

http://support.novell.com/security/cve/CVE-2013-2452.html

http://support.novell.com/security/cve/CVE-2013-2453.html

http://support.novell.com/security/cve/CVE-2013-2454.html

http://support.novell.com/security/cve/CVE-2013-2455.html

http://support.novell.com/security/cve/CVE-2013-2456.html

http://support.novell.com/security/cve/CVE-2013-2457.html

http://support.novell.com/security/cve/CVE-2013-2458.html

http://support.novell.com/security/cve/CVE-2013-2459.html

http://support.novell.com/security/cve/CVE-2013-2460.html

http://support.novell.com/security/cve/CVE-2013-2462.html

http://support.novell.com/security/cve/CVE-2013-2463.html

http://support.novell.com/security/cve/CVE-2013-2464.html

http://support.novell.com/security/cve/CVE-2013-2465.html

http://support.novell.com/security/cve/CVE-2013-2466.html

http://support.novell.com/security/cve/CVE-2013-2468.html

http://support.novell.com/security/cve/CVE-2013-2469.html

http://support.novell.com/security/cve/CVE-2013-2470.html

http://support.novell.com/security/cve/CVE-2013-2471.html

http://support.novell.com/security/cve/CVE-2013-2472.html

http://support.novell.com/security/cve/CVE-2013-2473.html

http://support.novell.com/security/cve/CVE-2013-3006.html

http://support.novell.com/security/cve/CVE-2013-3007.html

http://support.novell.com/security/cve/CVE-2013-3008.html

http://support.novell.com/security/cve/CVE-2013-3009.html

http://support.novell.com/security/cve/CVE-2013-3010.html

http://support.novell.com/security/cve/CVE-2013-3011.html

http://support.novell.com/security/cve/CVE-2013-3012.html

http://support.novell.com/security/cve/CVE-2013-3743.html

http://support.novell.com/security/cve/CVE-2013-3744.html

http://support.novell.com/security/cve/CVE-2013-4002.html

https://bugzilla.novell.com/817062

https://bugzilla.novell.com/823034

https://bugzilla.novell.com/829212

http://download.novell.com/patch/finder/?keywords=d33fe1389ae24456dea9f1571dec1536

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×