Mailinglist Archive: opensuse-security-announce (27 mails)

< Previous Next >
[security-announce] SUSE-SU-2013:1677-3: important: Security update for IBM Java 7
SUSE Security Update: Security update for IBM Java 7
______________________________________________________________________________

Announcement ID: SUSE-SU-2013:1677-3
Rating: important
References: #849212
Cross-References: CVE-2013-3829 CVE-2013-4041 CVE-2013-5372
CVE-2013-5375 CVE-2013-5456 CVE-2013-5457
CVE-2013-5458 CVE-2013-5772 CVE-2013-5774
CVE-2013-5776 CVE-2013-5778 CVE-2013-5780
CVE-2013-5782 CVE-2013-5783 CVE-2013-5784
CVE-2013-5787 CVE-2013-5788 CVE-2013-5789
CVE-2013-5790 CVE-2013-5797 CVE-2013-5800
CVE-2013-5801 CVE-2013-5802 CVE-2013-5803
CVE-2013-5804 CVE-2013-5809 CVE-2013-5812
CVE-2013-5814 CVE-2013-5817 CVE-2013-5818
CVE-2013-5819 CVE-2013-5820 CVE-2013-5823
CVE-2013-5824 CVE-2013-5825 CVE-2013-5829
CVE-2013-5830 CVE-2013-5831 CVE-2013-5832
CVE-2013-5838 CVE-2013-5840 CVE-2013-5842
CVE-2013-5843 CVE-2013-5848 CVE-2013-5849
CVE-2013-5850 CVE-2013-5851
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Java 11 SP3
SUSE Linux Enterprise Java 11 SP2
______________________________________________________________________________

An update that fixes 47 vulnerabilities is now available.

Description:


IBM Java 7 SR6 has been released and fixes lots of bugs and
security issues.

More information can be found on:
http://www.ibm.com/developerworks/java/jdk/alerts/
<http://www.ibm.com/developerworks/java/jdk/alerts/>

Security Issue references:

* CVE-2013-5458
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458
>
* CVE-2013-5456
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456
>
* CVE-2013-5457
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457
>
* CVE-2013-4041
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041
>
* CVE-2013-5375
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375
>
* CVE-2013-5372
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372
>
* CVE-2013-5843
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
>
* CVE-2013-5789
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
>
* CVE-2013-5830
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
>
* CVE-2013-5829
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
>
* CVE-2013-5787
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
>
* CVE-2013-5788
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788
>
* CVE-2013-5824
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
>
* CVE-2013-5842
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
>
* CVE-2013-5782
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
>
* CVE-2013-5817
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
>
* CVE-2013-5809
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
>
* CVE-2013-5814
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
>
* CVE-2013-5832
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832
>
* CVE-2013-5850
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850
>
* CVE-2013-5838
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838
>
* CVE-2013-5802
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
>
* CVE-2013-5812
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
>
* CVE-2013-5804
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
>
* CVE-2013-5783
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
>
* CVE-2013-3829
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
>
* CVE-2013-5823
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
>
* CVE-2013-5831
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
>
* CVE-2013-5820
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
>
* CVE-2013-5819
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
>
* CVE-2013-5818
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
>
* CVE-2013-5848
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
>
* CVE-2013-5776
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
>
* CVE-2013-5774
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
>
* CVE-2013-5825
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
>
* CVE-2013-5840
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
>
* CVE-2013-5801
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
>
* CVE-2013-5778
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
>
* CVE-2013-5851
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851
>
* CVE-2013-5800
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800
>
* CVE-2013-5784
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
>
* CVE-2013-5849
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
>
* CVE-2013-5790
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
>
* CVE-2013-5780
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
>
* CVE-2013-5797
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
>
* CVE-2013-5803
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
>
* CVE-2013-5772
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
>


Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 11 SP3:

zypper in -t patch sdksp3-java-1_7_0-ibm-8566

- SUSE Linux Enterprise Software Development Kit 11 SP2:

zypper in -t patch sdksp2-java-1_7_0-ibm-8565

- SUSE Linux Enterprise Server 11 SP3 for VMware:

zypper in -t patch slessp3-java-1_7_0-ibm-8566

- SUSE Linux Enterprise Server 11 SP3:

zypper in -t patch slessp3-java-1_7_0-ibm-8566

- SUSE Linux Enterprise Server 11 SP2 for VMware:

zypper in -t patch slessp2-java-1_7_0-ibm-8565

- SUSE Linux Enterprise Server 11 SP2:

zypper in -t patch slessp2-java-1_7_0-ibm-8565

- SUSE Linux Enterprise Java 11 SP3:

zypper in -t patch slejsp3-java-1_7_0-ibm-8566

- SUSE Linux Enterprise Java 11 SP2:

zypper in -t patch slejsp2-java-1_7_0-ibm-8565

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ppc64 s390x
x86_64):

java-1_7_0-ibm-devel-1.7.0_sr6.0-0.7.1

- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 s390x
x86_64):

java-1_7_0-ibm-devel-1.7.0_sr6.0-0.7.1

- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

java-1_7_0-ibm-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1

- SUSE Linux Enterprise Server 11 SP3 (i586 ppc64 s390x x86_64):

java-1_7_0-ibm-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1

- SUSE Linux Enterprise Server 11 SP3 (i586 x86_64):

java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1

- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

java-1_7_0-ibm-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1

- SUSE Linux Enterprise Server 11 SP2 (i586 ppc64 s390x x86_64):

java-1_7_0-ibm-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1

- SUSE Linux Enterprise Server 11 SP2 (i586 x86_64):

java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1

- SUSE Linux Enterprise Java 11 SP3 (i586 ppc64 s390x x86_64):

java-1_7_0-ibm-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-devel-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1

- SUSE Linux Enterprise Java 11 SP3 (i586 x86_64):

java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1

- SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64):

java-1_7_0-ibm-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-devel-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1

- SUSE Linux Enterprise Java 11 SP2 (i586 x86_64):

java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1
java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1


References:

http://support.novell.com/security/cve/CVE-2013-3829.html
http://support.novell.com/security/cve/CVE-2013-4041.html
http://support.novell.com/security/cve/CVE-2013-5372.html
http://support.novell.com/security/cve/CVE-2013-5375.html
http://support.novell.com/security/cve/CVE-2013-5456.html
http://support.novell.com/security/cve/CVE-2013-5457.html
http://support.novell.com/security/cve/CVE-2013-5458.html
http://support.novell.com/security/cve/CVE-2013-5772.html
http://support.novell.com/security/cve/CVE-2013-5774.html
http://support.novell.com/security/cve/CVE-2013-5776.html
http://support.novell.com/security/cve/CVE-2013-5778.html
http://support.novell.com/security/cve/CVE-2013-5780.html
http://support.novell.com/security/cve/CVE-2013-5782.html
http://support.novell.com/security/cve/CVE-2013-5783.html
http://support.novell.com/security/cve/CVE-2013-5784.html
http://support.novell.com/security/cve/CVE-2013-5787.html
http://support.novell.com/security/cve/CVE-2013-5788.html
http://support.novell.com/security/cve/CVE-2013-5789.html
http://support.novell.com/security/cve/CVE-2013-5790.html
http://support.novell.com/security/cve/CVE-2013-5797.html
http://support.novell.com/security/cve/CVE-2013-5800.html
http://support.novell.com/security/cve/CVE-2013-5801.html
http://support.novell.com/security/cve/CVE-2013-5802.html
http://support.novell.com/security/cve/CVE-2013-5803.html
http://support.novell.com/security/cve/CVE-2013-5804.html
http://support.novell.com/security/cve/CVE-2013-5809.html
http://support.novell.com/security/cve/CVE-2013-5812.html
http://support.novell.com/security/cve/CVE-2013-5814.html
http://support.novell.com/security/cve/CVE-2013-5817.html
http://support.novell.com/security/cve/CVE-2013-5818.html
http://support.novell.com/security/cve/CVE-2013-5819.html
http://support.novell.com/security/cve/CVE-2013-5820.html
http://support.novell.com/security/cve/CVE-2013-5823.html
http://support.novell.com/security/cve/CVE-2013-5824.html
http://support.novell.com/security/cve/CVE-2013-5825.html
http://support.novell.com/security/cve/CVE-2013-5829.html
http://support.novell.com/security/cve/CVE-2013-5830.html
http://support.novell.com/security/cve/CVE-2013-5831.html
http://support.novell.com/security/cve/CVE-2013-5832.html
http://support.novell.com/security/cve/CVE-2013-5838.html
http://support.novell.com/security/cve/CVE-2013-5840.html
http://support.novell.com/security/cve/CVE-2013-5842.html
http://support.novell.com/security/cve/CVE-2013-5843.html
http://support.novell.com/security/cve/CVE-2013-5848.html
http://support.novell.com/security/cve/CVE-2013-5849.html
http://support.novell.com/security/cve/CVE-2013-5850.html
http://support.novell.com/security/cve/CVE-2013-5851.html
https://bugzilla.novell.com/849212

http://download.novell.com/patch/finder/?keywords=ef51c242d9ef6e9ca30f6407189dda8b

http://download.novell.com/patch/finder/?keywords=f509561ef73c266408b23c081a5bfd6f

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages