SUSE-SU-2013:1677-2: important: Security update for Java 6

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Nov 18 16:04:11 MST 2013


   SUSE Security Update: Security update for Java 6
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1677-2
Rating:             important
References:         #849212 
Cross-References:   CVE-2013-3829 CVE-2013-4041 CVE-2013-5372
                    CVE-2013-5375 CVE-2013-5456 CVE-2013-5457
                    CVE-2013-5458 CVE-2013-5772 CVE-2013-5774
                    CVE-2013-5776 CVE-2013-5778 CVE-2013-5780
                    CVE-2013-5782 CVE-2013-5783 CVE-2013-5784
                    CVE-2013-5787 CVE-2013-5788 CVE-2013-5789
                    CVE-2013-5790 CVE-2013-5797 CVE-2013-5800
                    CVE-2013-5801 CVE-2013-5802 CVE-2013-5803
                    CVE-2013-5804 CVE-2013-5809 CVE-2013-5812
                    CVE-2013-5814 CVE-2013-5817 CVE-2013-5818
                    CVE-2013-5819 CVE-2013-5820 CVE-2013-5823
                    CVE-2013-5824 CVE-2013-5825 CVE-2013-5829
                    CVE-2013-5830 CVE-2013-5831 CVE-2013-5832
                    CVE-2013-5838 CVE-2013-5840 CVE-2013-5842
                    CVE-2013-5843 CVE-2013-5848 CVE-2013-5849
                    CVE-2013-5850 CVE-2013-5851
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Software Development Kit 11 SP2
                    SUSE Linux Enterprise Server 11 SP3 for VMware
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Server 11 SP2 for VMware
                    SUSE Linux Enterprise Server 11 SP2
                    SUSE Linux Enterprise Server 11 SP1 LTSS
                    SUSE Linux Enterprise Server 10 SP4 LTSS
                    SUSE Linux Enterprise Server 10 SP3 LTSS
                    SUSE Linux Enterprise Java 11 SP3
                    SUSE Linux Enterprise Java 11 SP2
______________________________________________________________________________

   An update that fixes 47 vulnerabilities is now available.

Description:


   IBM Java 6 SR15 has been released which fixes lots of bugs
   and security  issues.

   More information can be found on:
   http://www.ibm.com/developerworks/java/jdk/alerts/
   <http://www.ibm.com/developerworks/java/jdk/alerts/>

   Security Issue references:

   * CVE-2013-5458
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458
   >
   * CVE-2013-5456
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456
   >
   * CVE-2013-5457
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457
   >
   * CVE-2013-4041
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041
   >
   * CVE-2013-5375
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375
   >
   * CVE-2013-5372
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372
   >
   * CVE-2013-5843
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
   >
   * CVE-2013-5789
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
   >
   * CVE-2013-5830
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
   >
   * CVE-2013-5829
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
   >
   * CVE-2013-5787
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
   >
   * CVE-2013-5788
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788
   >
   * CVE-2013-5824
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
   >
   * CVE-2013-5842
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
   >
   * CVE-2013-5782
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
   >
   * CVE-2013-5817
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
   >
   * CVE-2013-5809
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
   >
   * CVE-2013-5814
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
   >
   * CVE-2013-5832
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832
   >
   * CVE-2013-5850
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850
   >
   * CVE-2013-5838
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838
   >
   * CVE-2013-5802
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
   >
   * CVE-2013-5812
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
   >
   * CVE-2013-5804
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
   >
   * CVE-2013-5783
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
   >
   * CVE-2013-3829
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
   >
   * CVE-2013-5823
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
   >
   * CVE-2013-5831
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
   >
   * CVE-2013-5820
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
   >
   * CVE-2013-5819
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
   >
   * CVE-2013-5818
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
   >
   * CVE-2013-5848
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
   >
   * CVE-2013-5776
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
   >
   * CVE-2013-5774
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
   >
   * CVE-2013-5825
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
   >
   * CVE-2013-5840
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
   >
   * CVE-2013-5801
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
   >
   * CVE-2013-5778
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
   >
   * CVE-2013-5851
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851
   >
   * CVE-2013-5800
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800
   >
   * CVE-2013-5784
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
   >
   * CVE-2013-5849
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
   >
   * CVE-2013-5790
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
   >
   * CVE-2013-5780
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
   >
   * CVE-2013-5797
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
   >
   * CVE-2013-5803
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
   >
   * CVE-2013-5772
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-java-1_6_0-ibm-8550

   - SUSE Linux Enterprise Software Development Kit 11 SP2:

      zypper in -t patch sdksp2-java-1_6_0-ibm-8549

   - SUSE Linux Enterprise Server 11 SP3 for VMware:

      zypper in -t patch slessp3-java-1_6_0-ibm-8550

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-java-1_6_0-ibm-8550

   - SUSE Linux Enterprise Server 11 SP2 for VMware:

      zypper in -t patch slessp2-java-1_6_0-ibm-8549

   - SUSE Linux Enterprise Server 11 SP2:

      zypper in -t patch slessp2-java-1_6_0-ibm-8549

   - SUSE Linux Enterprise Server 11 SP1 LTSS:

      zypper in -t patch slessp1-java-1_6_0-ibm-8557

   - SUSE Linux Enterprise Java 11 SP3:

      zypper in -t patch slejsp3-java-1_6_0-ibm-8550

   - SUSE Linux Enterprise Java 11 SP2:

      zypper in -t patch slejsp2-java-1_6_0-ibm-8549

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ppc64 s390x x86_64):

      java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):

      java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 s390x x86_64):

      java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):

      java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

      java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 ppc64 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP3 (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

      java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 ppc64 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP2 (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr15.0-0.14.1
      java-1_6_0-ibm-devel-1.6.0_sr15.0-0.14.1
      java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.14.1
      java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.14.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):

      java-1_6_0-ibm-32bit-1.6.0_sr15.0-0.14.1
      java-1_6_0-ibm-devel-32bit-1.6.0_sr15.0-0.14.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.14.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (x86_64):

      java-1_6_0-ibm-alsa-32bit-1.6.0_sr15.0-0.14.1
      java-1_6_0-ibm-plugin-32bit-1.6.0_sr15.0-0.14.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.14.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr15.0-0.9.9.1
      java-1_6_0-ibm-devel-1.6.0_sr15.0-0.9.9.1
      java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.9.9.1
      java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.9.9.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):

      java-1_6_0-ibm-32bit-1.6.0_sr15.0-0.9.9.1
      java-1_6_0-ibm-devel-32bit-1.6.0_sr15.0-0.9.9.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.9.9.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (x86_64):

      java-1_6_0-ibm-alsa-32bit-1.6.0_sr15.0-0.9.9.1
      java-1_6_0-ibm-plugin-32bit-1.6.0_sr15.0-0.9.9.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.9.9.1

   - SUSE Linux Enterprise Java 11 SP3 (i586 ppc64 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Java 11 SP3 (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Java 11 SP3 (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
      java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Java 11 SP2 (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1

   - SUSE Linux Enterprise Java 11 SP2 (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1


References:

   http://support.novell.com/security/cve/CVE-2013-3829.html
   http://support.novell.com/security/cve/CVE-2013-4041.html
   http://support.novell.com/security/cve/CVE-2013-5372.html
   http://support.novell.com/security/cve/CVE-2013-5375.html
   http://support.novell.com/security/cve/CVE-2013-5456.html
   http://support.novell.com/security/cve/CVE-2013-5457.html
   http://support.novell.com/security/cve/CVE-2013-5458.html
   http://support.novell.com/security/cve/CVE-2013-5772.html
   http://support.novell.com/security/cve/CVE-2013-5774.html
   http://support.novell.com/security/cve/CVE-2013-5776.html
   http://support.novell.com/security/cve/CVE-2013-5778.html
   http://support.novell.com/security/cve/CVE-2013-5780.html
   http://support.novell.com/security/cve/CVE-2013-5782.html
   http://support.novell.com/security/cve/CVE-2013-5783.html
   http://support.novell.com/security/cve/CVE-2013-5784.html
   http://support.novell.com/security/cve/CVE-2013-5787.html
   http://support.novell.com/security/cve/CVE-2013-5788.html
   http://support.novell.com/security/cve/CVE-2013-5789.html
   http://support.novell.com/security/cve/CVE-2013-5790.html
   http://support.novell.com/security/cve/CVE-2013-5797.html
   http://support.novell.com/security/cve/CVE-2013-5800.html
   http://support.novell.com/security/cve/CVE-2013-5801.html
   http://support.novell.com/security/cve/CVE-2013-5802.html
   http://support.novell.com/security/cve/CVE-2013-5803.html
   http://support.novell.com/security/cve/CVE-2013-5804.html
   http://support.novell.com/security/cve/CVE-2013-5809.html
   http://support.novell.com/security/cve/CVE-2013-5812.html
   http://support.novell.com/security/cve/CVE-2013-5814.html
   http://support.novell.com/security/cve/CVE-2013-5817.html
   http://support.novell.com/security/cve/CVE-2013-5818.html
   http://support.novell.com/security/cve/CVE-2013-5819.html
   http://support.novell.com/security/cve/CVE-2013-5820.html
   http://support.novell.com/security/cve/CVE-2013-5823.html
   http://support.novell.com/security/cve/CVE-2013-5824.html
   http://support.novell.com/security/cve/CVE-2013-5825.html
   http://support.novell.com/security/cve/CVE-2013-5829.html
   http://support.novell.com/security/cve/CVE-2013-5830.html
   http://support.novell.com/security/cve/CVE-2013-5831.html
   http://support.novell.com/security/cve/CVE-2013-5832.html
   http://support.novell.com/security/cve/CVE-2013-5838.html
   http://support.novell.com/security/cve/CVE-2013-5840.html
   http://support.novell.com/security/cve/CVE-2013-5842.html
   http://support.novell.com/security/cve/CVE-2013-5843.html
   http://support.novell.com/security/cve/CVE-2013-5848.html
   http://support.novell.com/security/cve/CVE-2013-5849.html
   http://support.novell.com/security/cve/CVE-2013-5850.html
   http://support.novell.com/security/cve/CVE-2013-5851.html
   https://bugzilla.novell.com/849212
   http://download.novell.com/patch/finder/?keywords=17a9db88ef351844a3d8a3520e5c917e
   http://download.novell.com/patch/finder/?keywords=59cacab82a07026e7b534dd6b64bd1d7
   http://download.novell.com/patch/finder/?keywords=63037b81cb4f45a6e8f55663f0b31d59
   http://download.novell.com/patch/finder/?keywords=92a6b678be36dd2d8ecf92f74430bc5b
   http://download.novell.com/patch/finder/?keywords=bfac4cdb47e4e4279150421690839df9



More information about the sle-security-updates mailing list