Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2013:1255-1: important: Security update for java-1_6_0-ibm

Recommended Posts

SUSE Security Update: Security update for java-1_6_0-ibm

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2013:1255-1

Rating: important

References: #817062 #823034 #829212

Cross-References: CVE-2013-1500 CVE-2013-1571 CVE-2013-2407

CVE-2013-2412 CVE-2013-2437 CVE-2013-2442

CVE-2013-2443 CVE-2013-2444 CVE-2013-2446

CVE-2013-2447 CVE-2013-2448 CVE-2013-2450

CVE-2013-2451 CVE-2013-2452 CVE-2013-2453

CVE-2013-2454 CVE-2013-2455 CVE-2013-2456

CVE-2013-2457 CVE-2013-2459 CVE-2013-2463

CVE-2013-2464 CVE-2013-2465 CVE-2013-2466

CVE-2013-2468 CVE-2013-2469 CVE-2013-2470

CVE-2013-2471 CVE-2013-2472 CVE-2013-2473

CVE-2013-3009 CVE-2013-3011 CVE-2013-3012

CVE-2013-3743 CVE-2013-4002

Affected Products:

SUSE Linux Enterprise Software Development Kit 11 SP3

SUSE Linux Enterprise Server 11 SP3 for VMware

SUSE Linux Enterprise Server 11 SP3

SUSE Linux Enterprise Server 10 SP4

SUSE Linux Enterprise Java 11 SP3

SUSE Linux Enterprise Java 10 SP4

______________________________________________________________________________

 

An update that fixes 35 vulnerabilities is now available.

 

Description:

 

 

IBM Java 1.6.0 has been updated to SR14 to fix bugs and

security issues.

 

Please see also

http://www.ibm.com/developerworks/java/jdk/alerts/

 

 

Also the following bugs have been fixed:

 

* add Europe/Busingen to tzmappings (bnc#817062)

* mark files in jre/bin and bin/ as executable

(bnc#823034)

 

Security Issue references:

 

* CVE-2013-3009

 

* CVE-2013-3011

 

* CVE-2013-3012

 

* CVE-2013-4002

 

* CVE-2013-2468

 

* CVE-2013-2469

 

* CVE-2013-2465

 

* CVE-2013-2464

 

* CVE-2013-2463

 

* CVE-2013-2473

 

* CVE-2013-2472

 

* CVE-2013-2471

 

* CVE-2013-2470

 

* CVE-2013-2459

 

* CVE-2013-2466

 

* CVE-2013-3743

 

* CVE-2013-2448

 

* CVE-2013-2442

 

* CVE-2013-2407

 

* CVE-2013-2454

 

* CVE-2013-2456

 

* CVE-2013-2453

 

* CVE-2013-2457

 

* CVE-2013-2455

 

* CVE-2013-2412

 

* CVE-2013-2443

 

* CVE-2013-2447

 

* CVE-2013-2437

 

* CVE-2013-2444

 

* CVE-2013-2452

 

* CVE-2013-2446

 

* CVE-2013-2450

 

* CVE-2013-1571

 

* CVE-2013-2451

 

* CVE-2013-1500

 

 

 

Patch Instructions:

 

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- SUSE Linux Enterprise Software Development Kit 11 SP3:

 

zypper in -t patch sdksp3-java-1_6_0-ibm-8105

 

- SUSE Linux Enterprise Server 11 SP3 for VMware:

 

zypper in -t patch slessp3-java-1_6_0-ibm-8105

 

- SUSE Linux Enterprise Server 11 SP3:

 

zypper in -t patch slessp3-java-1_6_0-ibm-8105

 

- SUSE Linux Enterprise Java 11 SP3:

 

zypper in -t patch slejsp3-java-1_6_0-ibm-8105

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ppc64 s390x x86_64):

 

java-1_6_0-ibm-devel-1.6.0_sr14.0-0.3.1

 

- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):

 

java-1_6_0-ibm-1.6.0_sr14.0-0.3.1

java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1

 

- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

 

java-1_6_0-ibm-1.6.0_sr14.0-0.3.1

java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1

java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1

java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1

 

- SUSE Linux Enterprise Server 11 SP3 for VMware (i586):

 

java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1

 

- SUSE Linux Enterprise Server 11 SP3 (i586 ppc64 s390x x86_64):

 

java-1_6_0-ibm-1.6.0_sr14.0-0.3.1

java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1

java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1

 

- SUSE Linux Enterprise Server 11 SP3 (i586 x86_64):

 

java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1

 

- SUSE Linux Enterprise Server 11 SP3 (i586):

 

java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1

 

- SUSE Linux Enterprise Server 10 SP4 (i586 ppc s390x x86_64):

 

java-1_6_0-ibm-1.6.0_sr14.0-0.11.1

java-1_6_0-ibm-devel-1.6.0_sr14.0-0.11.1

java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.11.1

java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.11.1

 

- SUSE Linux Enterprise Server 10 SP4 (i586 ppc x86_64):

 

java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.11.1

 

- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):

 

java-1_6_0-ibm-32bit-1.6.0_sr14.0-0.11.1

java-1_6_0-ibm-devel-32bit-1.6.0_sr14.0-0.11.1

 

- SUSE Linux Enterprise Server 10 SP4 (x86_64):

 

java-1_6_0-ibm-alsa-32bit-1.6.0_sr14.0-0.11.1

java-1_6_0-ibm-plugin-32bit-1.6.0_sr14.0-0.11.1

 

- SUSE Linux Enterprise Server 10 SP4 (i586):

 

java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.11.1

 

- SUSE Linux Enterprise Server 10 SP4 (ppc):

 

java-1_6_0-ibm-64bit-1.6.0_sr14.0-0.11.1

 

- SUSE Linux Enterprise Java 11 SP3 (i586 ppc64 s390x x86_64):

 

java-1_6_0-ibm-1.6.0_sr14.0-0.3.1

java-1_6_0-ibm-devel-1.6.0_sr14.0-0.3.1

java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1

java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1

 

- SUSE Linux Enterprise Java 11 SP3 (i586 x86_64):

 

java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1

 

- SUSE Linux Enterprise Java 11 SP3 (i586):

 

java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1

 

- SUSE Linux Enterprise Java 10 SP4 (x86_64):

 

java-1_6_0-ibm-1.6.0_sr14.0-0.11.1

java-1_6_0-ibm-devel-1.6.0_sr14.0-0.11.1

java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.11.1

java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.11.1

java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.11.1

 

 

References:

 

http://support.novell.com/security/cve/CVE-2013-1500.html

http://support.novell.com/security/cve/CVE-2013-1571.html

http://support.novell.com/security/cve/CVE-2013-2407.html

http://support.novell.com/security/cve/CVE-2013-2412.html

http://support.novell.com/security/cve/CVE-2013-2437.html

http://support.novell.com/security/cve/CVE-2013-2442.html

http://support.novell.com/security/cve/CVE-2013-2443.html

http://support.novell.com/security/cve/CVE-2013-2444.html

http://support.novell.com/security/cve/CVE-2013-2446.html

http://support.novell.com/security/cve/CVE-2013-2447.html

http://support.novell.com/security/cve/CVE-2013-2448.html

http://support.novell.com/security/cve/CVE-2013-2450.html

http://support.novell.com/security/cve/CVE-2013-2451.html

http://support.novell.com/security/cve/CVE-2013-2452.html

http://support.novell.com/security/cve/CVE-2013-2453.html

http://support.novell.com/security/cve/CVE-2013-2454.html

http://support.novell.com/security/cve/CVE-2013-2455.html

http://support.novell.com/security/cve/CVE-2013-2456.html

http://support.novell.com/security/cve/CVE-2013-2457.html

http://support.novell.com/security/cve/CVE-2013-2459.html

http://support.novell.com/security/cve/CVE-2013-2463.html

http://support.novell.com/security/cve/CVE-2013-2464.html

http://support.novell.com/security/cve/CVE-2013-2465.html

http://support.novell.com/security/cve/CVE-2013-2466.html

http://support.novell.com/security/cve/CVE-2013-2468.html

http://support.novell.com/security/cve/CVE-2013-2469.html

http://support.novell.com/security/cve/CVE-2013-2470.html

http://support.novell.com/security/cve/CVE-2013-2471.html

http://support.novell.com/security/cve/CVE-2013-2472.html

http://support.novell.com/security/cve/CVE-2013-2473.html

http://support.novell.com/security/cve/CVE-2013-3009.html

http://support.novell.com/security/cve/CVE-2013-3011.html

http://support.novell.com/security/cve/CVE-2013-3012.html

http://support.novell.com/security/cve/CVE-2013-3743.html

http://support.novell.com/security/cve/CVE-2013-4002.html

https://bugzilla.novell.com/817062

https://bugzilla.novell.com/823034

https://bugzilla.novell.com/829212

http://download.novell.com/patch/finder/?keywords=2506266f7074154371238b0be5bf61f3

http://download.novell.com/patch/finder/?keywords=d4115b4339a15f88677fc83a534c4dc3

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×