SUSE-SU-2013:1677-3: important: Security update for IBM Java 7

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Nov 22 00:04:17 MST 2013


   SUSE Security Update: Security update for IBM Java 7
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1677-3
Rating:             important
References:         #849212 
Cross-References:   CVE-2013-3829 CVE-2013-4041 CVE-2013-5372
                    CVE-2013-5375 CVE-2013-5456 CVE-2013-5457
                    CVE-2013-5458 CVE-2013-5772 CVE-2013-5774
                    CVE-2013-5776 CVE-2013-5778 CVE-2013-5780
                    CVE-2013-5782 CVE-2013-5783 CVE-2013-5784
                    CVE-2013-5787 CVE-2013-5788 CVE-2013-5789
                    CVE-2013-5790 CVE-2013-5797 CVE-2013-5800
                    CVE-2013-5801 CVE-2013-5802 CVE-2013-5803
                    CVE-2013-5804 CVE-2013-5809 CVE-2013-5812
                    CVE-2013-5814 CVE-2013-5817 CVE-2013-5818
                    CVE-2013-5819 CVE-2013-5820 CVE-2013-5823
                    CVE-2013-5824 CVE-2013-5825 CVE-2013-5829
                    CVE-2013-5830 CVE-2013-5831 CVE-2013-5832
                    CVE-2013-5838 CVE-2013-5840 CVE-2013-5842
                    CVE-2013-5843 CVE-2013-5848 CVE-2013-5849
                    CVE-2013-5850 CVE-2013-5851
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Software Development Kit 11 SP2
                    SUSE Linux Enterprise Server 11 SP3 for VMware
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Server 11 SP2 for VMware
                    SUSE Linux Enterprise Server 11 SP2
                    SUSE Linux Enterprise Java 11 SP3
                    SUSE Linux Enterprise Java 11 SP2
______________________________________________________________________________

   An update that fixes 47 vulnerabilities is now available.

Description:


   IBM Java 7 SR6 has been released and fixes lots of bugs and
   security  issues.

   More information can be found on:
   http://www.ibm.com/developerworks/java/jdk/alerts/
   <http://www.ibm.com/developerworks/java/jdk/alerts/>

   Security Issue references:

   * CVE-2013-5458
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458
   >
   * CVE-2013-5456
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456
   >
   * CVE-2013-5457
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457
   >
   * CVE-2013-4041
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041
   >
   * CVE-2013-5375
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375
   >
   * CVE-2013-5372
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372
   >
   * CVE-2013-5843
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
   >
   * CVE-2013-5789
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
   >
   * CVE-2013-5830
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
   >
   * CVE-2013-5829
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
   >
   * CVE-2013-5787
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
   >
   * CVE-2013-5788
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788
   >
   * CVE-2013-5824
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
   >
   * CVE-2013-5842
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
   >
   * CVE-2013-5782
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
   >
   * CVE-2013-5817
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
   >
   * CVE-2013-5809
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
   >
   * CVE-2013-5814
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
   >
   * CVE-2013-5832
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832
   >
   * CVE-2013-5850
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850
   >
   * CVE-2013-5838
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838
   >
   * CVE-2013-5802
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
   >
   * CVE-2013-5812
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
   >
   * CVE-2013-5804
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
   >
   * CVE-2013-5783
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
   >
   * CVE-2013-3829
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
   >
   * CVE-2013-5823
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
   >
   * CVE-2013-5831
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
   >
   * CVE-2013-5820
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
   >
   * CVE-2013-5819
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
   >
   * CVE-2013-5818
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
   >
   * CVE-2013-5848
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
   >
   * CVE-2013-5776
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
   >
   * CVE-2013-5774
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
   >
   * CVE-2013-5825
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
   >
   * CVE-2013-5840
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
   >
   * CVE-2013-5801
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
   >
   * CVE-2013-5778
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
   >
   * CVE-2013-5851
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851
   >
   * CVE-2013-5800
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800
   >
   * CVE-2013-5784
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
   >
   * CVE-2013-5849
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
   >
   * CVE-2013-5790
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
   >
   * CVE-2013-5780
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
   >
   * CVE-2013-5797
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
   >
   * CVE-2013-5803
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
   >
   * CVE-2013-5772
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
   >


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-java-1_7_0-ibm-8566

   - SUSE Linux Enterprise Software Development Kit 11 SP2:

      zypper in -t patch sdksp2-java-1_7_0-ibm-8565

   - SUSE Linux Enterprise Server 11 SP3 for VMware:

      zypper in -t patch slessp3-java-1_7_0-ibm-8566

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-java-1_7_0-ibm-8566

   - SUSE Linux Enterprise Server 11 SP2 for VMware:

      zypper in -t patch slessp2-java-1_7_0-ibm-8565

   - SUSE Linux Enterprise Server 11 SP2:

      zypper in -t patch slessp2-java-1_7_0-ibm-8565

   - SUSE Linux Enterprise Java 11 SP3:

      zypper in -t patch slejsp3-java-1_7_0-ibm-8566

   - SUSE Linux Enterprise Java 11 SP2:

      zypper in -t patch slejsp2-java-1_7_0-ibm-8565

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ppc64 s390x x86_64):

      java-1_7_0-ibm-devel-1.7.0_sr6.0-0.7.1

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 s390x x86_64):

      java-1_7_0-ibm-devel-1.7.0_sr6.0-0.7.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

      java-1_7_0-ibm-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 ppc64 s390x x86_64):

      java-1_7_0-ibm-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64):

      java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

      java-1_7_0-ibm-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 ppc64 s390x x86_64):

      java-1_7_0-ibm-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64):

      java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1

   - SUSE Linux Enterprise Java 11 SP3 (i586 ppc64 s390x x86_64):

      java-1_7_0-ibm-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-devel-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1

   - SUSE Linux Enterprise Java 11 SP3 (i586 x86_64):

      java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1

   - SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64):

      java-1_7_0-ibm-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-devel-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1

   - SUSE Linux Enterprise Java 11 SP2 (i586 x86_64):

      java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1
      java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1


References:

   http://support.novell.com/security/cve/CVE-2013-3829.html
   http://support.novell.com/security/cve/CVE-2013-4041.html
   http://support.novell.com/security/cve/CVE-2013-5372.html
   http://support.novell.com/security/cve/CVE-2013-5375.html
   http://support.novell.com/security/cve/CVE-2013-5456.html
   http://support.novell.com/security/cve/CVE-2013-5457.html
   http://support.novell.com/security/cve/CVE-2013-5458.html
   http://support.novell.com/security/cve/CVE-2013-5772.html
   http://support.novell.com/security/cve/CVE-2013-5774.html
   http://support.novell.com/security/cve/CVE-2013-5776.html
   http://support.novell.com/security/cve/CVE-2013-5778.html
   http://support.novell.com/security/cve/CVE-2013-5780.html
   http://support.novell.com/security/cve/CVE-2013-5782.html
   http://support.novell.com/security/cve/CVE-2013-5783.html
   http://support.novell.com/security/cve/CVE-2013-5784.html
   http://support.novell.com/security/cve/CVE-2013-5787.html
   http://support.novell.com/security/cve/CVE-2013-5788.html
   http://support.novell.com/security/cve/CVE-2013-5789.html
   http://support.novell.com/security/cve/CVE-2013-5790.html
   http://support.novell.com/security/cve/CVE-2013-5797.html
   http://support.novell.com/security/cve/CVE-2013-5800.html
   http://support.novell.com/security/cve/CVE-2013-5801.html
   http://support.novell.com/security/cve/CVE-2013-5802.html
   http://support.novell.com/security/cve/CVE-2013-5803.html
   http://support.novell.com/security/cve/CVE-2013-5804.html
   http://support.novell.com/security/cve/CVE-2013-5809.html
   http://support.novell.com/security/cve/CVE-2013-5812.html
   http://support.novell.com/security/cve/CVE-2013-5814.html
   http://support.novell.com/security/cve/CVE-2013-5817.html
   http://support.novell.com/security/cve/CVE-2013-5818.html
   http://support.novell.com/security/cve/CVE-2013-5819.html
   http://support.novell.com/security/cve/CVE-2013-5820.html
   http://support.novell.com/security/cve/CVE-2013-5823.html
   http://support.novell.com/security/cve/CVE-2013-5824.html
   http://support.novell.com/security/cve/CVE-2013-5825.html
   http://support.novell.com/security/cve/CVE-2013-5829.html
   http://support.novell.com/security/cve/CVE-2013-5830.html
   http://support.novell.com/security/cve/CVE-2013-5831.html
   http://support.novell.com/security/cve/CVE-2013-5832.html
   http://support.novell.com/security/cve/CVE-2013-5838.html
   http://support.novell.com/security/cve/CVE-2013-5840.html
   http://support.novell.com/security/cve/CVE-2013-5842.html
   http://support.novell.com/security/cve/CVE-2013-5843.html
   http://support.novell.com/security/cve/CVE-2013-5848.html
   http://support.novell.com/security/cve/CVE-2013-5849.html
   http://support.novell.com/security/cve/CVE-2013-5850.html
   http://support.novell.com/security/cve/CVE-2013-5851.html
   https://bugzilla.novell.com/849212
   http://download.novell.com/patch/finder/?keywords=ef51c242d9ef6e9ca30f6407189dda8b
   http://download.novell.com/patch/finder/?keywords=f509561ef73c266408b23c081a5bfd6f



More information about the sle-security-updates mailing list