SUSE Security Update: Security update for Java 6 ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:1677-2 Rating: important References: #849212 Cross-References: CVE-2013-3829 CVE-2013-4041 CVE-2013-5372 CVE-2013-5375 CVE-2013-5456 CVE-2013-5457 CVE-2013-5458 CVE-2013-5772 CVE-2013-5774 CVE-2013-5776 CVE-2013-5778 CVE-2013-5780 CVE-2013-5782 CVE-2013-5783 CVE-2013-5784 CVE-2013-5787 CVE-2013-5788 CVE-2013-5789 CVE-2013-5790 CVE-2013-5797 CVE-2013-5800 CVE-2013-5801 CVE-2013-5802 CVE-2013-5803 CVE-2013-5804 CVE-2013-5809 CVE-2013-5812 CVE-2013-5814 CVE-2013-5817 CVE-2013-5818 CVE-2013-5819 CVE-2013-5820 CVE-2013-5823 CVE-2013-5824 CVE-2013-5825 CVE-2013-5829 CVE-2013-5830 CVE-2013-5831 CVE-2013-5832 CVE-2013-5838 CVE-2013-5840 CVE-2013-5842 CVE-2013-5843 CVE-2013-5848 CVE-2013-5849 CVE-2013-5850 CVE-2013-5851 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 LTSS SUSE Linux Enterprise Server 10 SP4 LTSS SUSE Linux Enterprise Server 10 SP3 LTSS SUSE Linux Enterprise Java 11 SP3 SUSE Linux Enterprise Java 11 SP2 ______________________________________________________________________________ An update that fixes 47 vulnerabilities is now available. Description: IBM Java 6 SR15 has been released which fixes lots of bugs and security issues. More information can be found on: http://www.ibm.com/developerworks/java/jdk/alerts/ <http://www.ibm.com/developerworks/java/jdk/alerts/> Security Issue references: * CVE-2013-5458 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458
* CVE-2013-5456 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456
* CVE-2013-5457 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457
* CVE-2013-4041 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041
* CVE-2013-5375 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375
* CVE-2013-5372 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372
* CVE-2013-5843 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
* CVE-2013-5789 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
* CVE-2013-5830 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
* CVE-2013-5829 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
* CVE-2013-5787 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
* CVE-2013-5788 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788
* CVE-2013-5824 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
* CVE-2013-5842 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
* CVE-2013-5782 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
* CVE-2013-5817 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
* CVE-2013-5809 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
* CVE-2013-5814 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
* CVE-2013-5832 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832
* CVE-2013-5850 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850
* CVE-2013-5838 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838
* CVE-2013-5802 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
* CVE-2013-5812 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
* CVE-2013-5804 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
* CVE-2013-5783 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
* CVE-2013-3829 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
* CVE-2013-5823 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
* CVE-2013-5831 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
* CVE-2013-5820 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
* CVE-2013-5819 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
* CVE-2013-5818 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
* CVE-2013-5848 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
* CVE-2013-5776 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
* CVE-2013-5774 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
* CVE-2013-5825 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
* CVE-2013-5840 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
* CVE-2013-5801 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
* CVE-2013-5778 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
* CVE-2013-5851 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851
* CVE-2013-5800 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800
* CVE-2013-5784 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
* CVE-2013-5849 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
* CVE-2013-5790 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
* CVE-2013-5780 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
* CVE-2013-5797 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
* CVE-2013-5803 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
* CVE-2013-5772 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-java-1_6_0-ibm-8550 - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-java-1_6_0-ibm-8549 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-java-1_6_0-ibm-8550 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-java-1_6_0-ibm-8550 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-java-1_6_0-ibm-8549 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-java-1_6_0-ibm-8549 - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-java-1_6_0-ibm-8557 - SUSE Linux Enterprise Java 11 SP3: zypper in -t patch slejsp3-java-1_6_0-ibm-8550 - SUSE Linux Enterprise Java 11 SP2: zypper in -t patch slejsp2-java-1_6_0-ibm-8549 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64): java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64): java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586): java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64): java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP3 (i586): java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586): java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64): java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP2 (i586): java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 x86_64): java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (i586): java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64): java-1_6_0-ibm-1.6.0_sr15.0-0.14.1 java-1_6_0-ibm-devel-1.6.0_sr15.0-0.14.1 java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.14.1 java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.14.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64): java-1_6_0-ibm-32bit-1.6.0_sr15.0-0.14.1 java-1_6_0-ibm-devel-32bit-1.6.0_sr15.0-0.14.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 x86_64): java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.14.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (x86_64): java-1_6_0-ibm-alsa-32bit-1.6.0_sr15.0-0.14.1 java-1_6_0-ibm-plugin-32bit-1.6.0_sr15.0-0.14.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586): java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.14.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64): java-1_6_0-ibm-1.6.0_sr15.0-0.9.9.1 java-1_6_0-ibm-devel-1.6.0_sr15.0-0.9.9.1 java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.9.9.1 java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.9.9.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64): java-1_6_0-ibm-32bit-1.6.0_sr15.0-0.9.9.1 java-1_6_0-ibm-devel-32bit-1.6.0_sr15.0-0.9.9.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 x86_64): java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.9.9.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (x86_64): java-1_6_0-ibm-alsa-32bit-1.6.0_sr15.0-0.9.9.1 java-1_6_0-ibm-plugin-32bit-1.6.0_sr15.0-0.9.9.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (i586): java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.9.9.1 - SUSE Linux Enterprise Java 11 SP3 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Java 11 SP3 (i586 x86_64): java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Java 11 SP3 (i586): java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Java 11 SP2 (i586 x86_64): java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 - SUSE Linux Enterprise Java 11 SP2 (i586): java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 References: http://support.novell.com/security/cve/CVE-2013-3829.html http://support.novell.com/security/cve/CVE-2013-4041.html http://support.novell.com/security/cve/CVE-2013-5372.html http://support.novell.com/security/cve/CVE-2013-5375.html http://support.novell.com/security/cve/CVE-2013-5456.html http://support.novell.com/security/cve/CVE-2013-5457.html http://support.novell.com/security/cve/CVE-2013-5458.html http://support.novell.com/security/cve/CVE-2013-5772.html http://support.novell.com/security/cve/CVE-2013-5774.html http://support.novell.com/security/cve/CVE-2013-5776.html http://support.novell.com/security/cve/CVE-2013-5778.html http://support.novell.com/security/cve/CVE-2013-5780.html http://support.novell.com/security/cve/CVE-2013-5782.html http://support.novell.com/security/cve/CVE-2013-5783.html http://support.novell.com/security/cve/CVE-2013-5784.html http://support.novell.com/security/cve/CVE-2013-5787.html http://support.novell.com/security/cve/CVE-2013-5788.html http://support.novell.com/security/cve/CVE-2013-5789.html http://support.novell.com/security/cve/CVE-2013-5790.html http://support.novell.com/security/cve/CVE-2013-5797.html http://support.novell.com/security/cve/CVE-2013-5800.html http://support.novell.com/security/cve/CVE-2013-5801.html http://support.novell.com/security/cve/CVE-2013-5802.html http://support.novell.com/security/cve/CVE-2013-5803.html http://support.novell.com/security/cve/CVE-2013-5804.html http://support.novell.com/security/cve/CVE-2013-5809.html http://support.novell.com/security/cve/CVE-2013-5812.html http://support.novell.com/security/cve/CVE-2013-5814.html http://support.novell.com/security/cve/CVE-2013-5817.html http://support.novell.com/security/cve/CVE-2013-5818.html http://support.novell.com/security/cve/CVE-2013-5819.html http://support.novell.com/security/cve/CVE-2013-5820.html http://support.novell.com/security/cve/CVE-2013-5823.html http://support.novell.com/security/cve/CVE-2013-5824.html http://support.novell.com/security/cve/CVE-2013-5825.html http://support.novell.com/security/cve/CVE-2013-5829.html http://support.novell.com/security/cve/CVE-2013-5830.html http://support.novell.com/security/cve/CVE-2013-5831.html http://support.novell.com/security/cve/CVE-2013-5832.html http://support.novell.com/security/cve/CVE-2013-5838.html http://support.novell.com/security/cve/CVE-2013-5840.html http://support.novell.com/security/cve/CVE-2013-5842.html http://support.novell.com/security/cve/CVE-2013-5843.html http://support.novell.com/security/cve/CVE-2013-5848.html http://support.novell.com/security/cve/CVE-2013-5849.html http://support.novell.com/security/cve/CVE-2013-5850.html http://support.novell.com/security/cve/CVE-2013-5851.html https://bugzilla.novell.com/849212 http://download.novell.com/patch/finder/?keywords=17a9db88ef351844a3d8a3520e... http://download.novell.com/patch/finder/?keywords=59cacab82a07026e7b534dd6b6... http://download.novell.com/patch/finder/?keywords=63037b81cb4f45a6e8f55663f0... http://download.novell.com/patch/finder/?keywords=92a6b678be36dd2d8ecf92f744... http://download.novell.com/patch/finder/?keywords=bfac4cdb47e4e4279150421690... -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org