SUSE Security Update: Security update for IBM Java 5 ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:1677-1 Rating: important References: #849212 Cross-References: CVE-2013-3829 CVE-2013-4041 CVE-2013-5372 CVE-2013-5375 CVE-2013-5456 CVE-2013-5457 CVE-2013-5458 CVE-2013-5772 CVE-2013-5774 CVE-2013-5776 CVE-2013-5778 CVE-2013-5780 CVE-2013-5782 CVE-2013-5783 CVE-2013-5784 CVE-2013-5787 CVE-2013-5788 CVE-2013-5789 CVE-2013-5790 CVE-2013-5797 CVE-2013-5800 CVE-2013-5801 CVE-2013-5802 CVE-2013-5803 CVE-2013-5804 CVE-2013-5809 CVE-2013-5812 CVE-2013-5814 CVE-2013-5817 CVE-2013-5818 CVE-2013-5819 CVE-2013-5820 CVE-2013-5823 CVE-2013-5824 CVE-2013-5825 CVE-2013-5829 CVE-2013-5830 CVE-2013-5831 CVE-2013-5832 CVE-2013-5838 CVE-2013-5840 CVE-2013-5842 CVE-2013-5843 CVE-2013-5848 CVE-2013-5849 CVE-2013-5850 CVE-2013-5851 Affected Products: SUSE CORE 9 ______________________________________________________________________________ An update that fixes 47 vulnerabilities is now available. Description: IBM Java 5 SR16-FP4 has been released which fixes lots of bugs and security issues. More information can be found on: http://www.ibm.com/developerworks/java/jdk/alerts/ <http://www.ibm.com/developerworks/java/jdk/alerts/> Security Issue references: * CVE-2013-5458 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458
* CVE-2013-5456 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456
* CVE-2013-5457 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457
* CVE-2013-4041 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041
* CVE-2013-5375 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375
* CVE-2013-5372 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372
* CVE-2013-5843 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
* CVE-2013-5789 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
* CVE-2013-5830 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
* CVE-2013-5829 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
* CVE-2013-5787 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
* CVE-2013-5788 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788
* CVE-2013-5824 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
* CVE-2013-5842 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
* CVE-2013-5782 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
* CVE-2013-5817 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
* CVE-2013-5809 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
* CVE-2013-5814 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
* CVE-2013-5832 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832
* CVE-2013-5850 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850
* CVE-2013-5838 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838
* CVE-2013-5802 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
* CVE-2013-5812 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
* CVE-2013-5804 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
* CVE-2013-5783 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
* CVE-2013-3829 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
* CVE-2013-5823 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
* CVE-2013-5831 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
* CVE-2013-5820 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
* CVE-2013-5819 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
* CVE-2013-5818 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
* CVE-2013-5848 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
* CVE-2013-5776 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
* CVE-2013-5774 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
* CVE-2013-5825 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
* CVE-2013-5840 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
* CVE-2013-5801 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
* CVE-2013-5778 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
* CVE-2013-5851 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851
* CVE-2013-5800 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800
* CVE-2013-5784 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
* CVE-2013-5849 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
* CVE-2013-5790 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
* CVE-2013-5780 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
* CVE-2013-5797 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
* CVE-2013-5803 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
* CVE-2013-5772 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
Package List: - SUSE CORE 9 (i586 s390 s390x x86_64): IBMJava5-JRE-1.5.0_sr16.4-0.4 IBMJava5-SDK-1.5.0_sr16.4-0.4 References: http://support.novell.com/security/cve/CVE-2013-3829.html http://support.novell.com/security/cve/CVE-2013-4041.html http://support.novell.com/security/cve/CVE-2013-5372.html http://support.novell.com/security/cve/CVE-2013-5375.html http://support.novell.com/security/cve/CVE-2013-5456.html http://support.novell.com/security/cve/CVE-2013-5457.html http://support.novell.com/security/cve/CVE-2013-5458.html http://support.novell.com/security/cve/CVE-2013-5772.html http://support.novell.com/security/cve/CVE-2013-5774.html http://support.novell.com/security/cve/CVE-2013-5776.html http://support.novell.com/security/cve/CVE-2013-5778.html http://support.novell.com/security/cve/CVE-2013-5780.html http://support.novell.com/security/cve/CVE-2013-5782.html http://support.novell.com/security/cve/CVE-2013-5783.html http://support.novell.com/security/cve/CVE-2013-5784.html http://support.novell.com/security/cve/CVE-2013-5787.html http://support.novell.com/security/cve/CVE-2013-5788.html http://support.novell.com/security/cve/CVE-2013-5789.html http://support.novell.com/security/cve/CVE-2013-5790.html http://support.novell.com/security/cve/CVE-2013-5797.html http://support.novell.com/security/cve/CVE-2013-5800.html http://support.novell.com/security/cve/CVE-2013-5801.html http://support.novell.com/security/cve/CVE-2013-5802.html http://support.novell.com/security/cve/CVE-2013-5803.html http://support.novell.com/security/cve/CVE-2013-5804.html http://support.novell.com/security/cve/CVE-2013-5809.html http://support.novell.com/security/cve/CVE-2013-5812.html http://support.novell.com/security/cve/CVE-2013-5814.html http://support.novell.com/security/cve/CVE-2013-5817.html http://support.novell.com/security/cve/CVE-2013-5818.html http://support.novell.com/security/cve/CVE-2013-5819.html http://support.novell.com/security/cve/CVE-2013-5820.html http://support.novell.com/security/cve/CVE-2013-5823.html http://support.novell.com/security/cve/CVE-2013-5824.html http://support.novell.com/security/cve/CVE-2013-5825.html http://support.novell.com/security/cve/CVE-2013-5829.html http://support.novell.com/security/cve/CVE-2013-5830.html http://support.novell.com/security/cve/CVE-2013-5831.html http://support.novell.com/security/cve/CVE-2013-5832.html http://support.novell.com/security/cve/CVE-2013-5838.html http://support.novell.com/security/cve/CVE-2013-5840.html http://support.novell.com/security/cve/CVE-2013-5842.html http://support.novell.com/security/cve/CVE-2013-5843.html http://support.novell.com/security/cve/CVE-2013-5848.html http://support.novell.com/security/cve/CVE-2013-5849.html http://support.novell.com/security/cve/CVE-2013-5850.html http://support.novell.com/security/cve/CVE-2013-5851.html https://bugzilla.novell.com/849212 http://download.novell.com/patch/finder/?keywords=ee3af08cb4368a9b3504c613b9... -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org