SUSE-SU-2013:1263-1: important: Security update for java-1_5_0-ibm

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Sat Jul 27 09:04:10 MDT 2013


   SUSE Security Update: Security update for java-1_5_0-ibm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1263-1
Rating:             important
References:         #817062 #823034 #829212 
Cross-References:   CVE-2013-1500 CVE-2013-1571 CVE-2013-2443
                    CVE-2013-2444 CVE-2013-2446 CVE-2013-2447
                    CVE-2013-2448 CVE-2013-2450 CVE-2013-2452
                    CVE-2013-2454 CVE-2013-2455 CVE-2013-2456
                    CVE-2013-2457 CVE-2013-2459 CVE-2013-2463
                    CVE-2013-2464 CVE-2013-2465 CVE-2013-2469
                    CVE-2013-2470 CVE-2013-2471 CVE-2013-2472
                    CVE-2013-2473 CVE-2013-3009 CVE-2013-3011
                    CVE-2013-3012 CVE-2013-3743 CVE-2013-4002
                   
Affected Products:
                    SUSE Linux Enterprise Server 10 SP4
                    SUSE Linux Enterprise Java 10 SP4
                    SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________

   An update that fixes 27 vulnerabilities is now available.

Description:


   IBM Java 1.5.0 has been updated to SR16-FP3 to fix bugs and
   security  issues.

   Please see also
   http://www.ibm.com/developerworks/java/jdk/alerts/
   <http://www.ibm.com/developerworks/java/jdk/alerts/>

   Also the following bug has been fixed:

   * add Europe/Busingen to tzmappings (bnc#817062)
   * mark files in jre/bin and bin/ as executable
   (bnc#823034)

   Security Issue references:

   * CVE-2013-3009
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009
   >
   * CVE-2013-3011
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011
   >
   * CVE-2013-3012
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012
   >
   * CVE-2013-4002
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
   >
   * CVE-2013-2469
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469
   >
   * CVE-2013-2465
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465
   >
   * CVE-2013-2464
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464
   >
   * CVE-2013-2463
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463
   >
   * CVE-2013-2473
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473
   >
   * CVE-2013-2472
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472
   >
   * CVE-2013-2471
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471
   >
   * CVE-2013-2470
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470
   >
   * CVE-2013-2459
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459
   >
   * CVE-2013-3743
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3743
   >
   * CVE-2013-2448
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448
   >
   * CVE-2013-2454
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454
   >
   * CVE-2013-2456
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456
   >
   * CVE-2013-2457
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457
   >
   * CVE-2013-2455
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455
   >
   * CVE-2013-2443
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443
   >
   * CVE-2013-2447
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447
   >
   * CVE-2013-2444
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444
   >
   * CVE-2013-2452
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452
   >
   * CVE-2013-2446
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446
   >
   * CVE-2013-2450
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450
   >
   * CVE-2013-1571
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571
   >
   * CVE-2013-1500
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500
   >



Package List:

   - SUSE Linux Enterprise Server 10 SP4 (i586 ppc s390x x86_64):

      java-1_5_0-ibm-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-devel-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-fonts-1.5.0_sr16.3-0.5.1

   - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):

      java-1_5_0-ibm-32bit-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-devel-32bit-1.5.0_sr16.3-0.5.1

   - SUSE Linux Enterprise Server 10 SP4 (i586 ppc):

      java-1_5_0-ibm-jdbc-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-plugin-1.5.0_sr16.3-0.5.1

   - SUSE Linux Enterprise Server 10 SP4 (x86_64):

      java-1_5_0-ibm-alsa-32bit-1.5.0_sr16.3-0.5.1

   - SUSE Linux Enterprise Server 10 SP4 (i586):

      java-1_5_0-ibm-alsa-1.5.0_sr16.3-0.5.1

   - SUSE Linux Enterprise Server 10 SP4 (ppc):

      java-1_5_0-ibm-64bit-1.5.0_sr16.3-0.5.1

   - SUSE Linux Enterprise Java 10 SP4 (i586 ppc s390x x86_64):

      java-1_5_0-ibm-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-devel-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-fonts-1.5.0_sr16.3-0.5.1

   - SUSE Linux Enterprise Java 10 SP4 (ppc):

      java-1_5_0-ibm-jdbc-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-plugin-1.5.0_sr16.3-0.5.1

   - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):

      java-1_5_0-ibm-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-demo-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-devel-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-fonts-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-src-1.5.0_sr16.3-0.5.1

   - SUSE Linux Enterprise Desktop 10 SP4 (x86_64):

      java-1_5_0-ibm-32bit-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-alsa-32bit-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-devel-32bit-1.5.0_sr16.3-0.5.1

   - SUSE Linux Enterprise Desktop 10 SP4 (i586):

      java-1_5_0-ibm-alsa-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-jdbc-1.5.0_sr16.3-0.5.1
      java-1_5_0-ibm-plugin-1.5.0_sr16.3-0.5.1


References:

   http://support.novell.com/security/cve/CVE-2013-1500.html
   http://support.novell.com/security/cve/CVE-2013-1571.html
   http://support.novell.com/security/cve/CVE-2013-2443.html
   http://support.novell.com/security/cve/CVE-2013-2444.html
   http://support.novell.com/security/cve/CVE-2013-2446.html
   http://support.novell.com/security/cve/CVE-2013-2447.html
   http://support.novell.com/security/cve/CVE-2013-2448.html
   http://support.novell.com/security/cve/CVE-2013-2450.html
   http://support.novell.com/security/cve/CVE-2013-2452.html
   http://support.novell.com/security/cve/CVE-2013-2454.html
   http://support.novell.com/security/cve/CVE-2013-2455.html
   http://support.novell.com/security/cve/CVE-2013-2456.html
   http://support.novell.com/security/cve/CVE-2013-2457.html
   http://support.novell.com/security/cve/CVE-2013-2459.html
   http://support.novell.com/security/cve/CVE-2013-2463.html
   http://support.novell.com/security/cve/CVE-2013-2464.html
   http://support.novell.com/security/cve/CVE-2013-2465.html
   http://support.novell.com/security/cve/CVE-2013-2469.html
   http://support.novell.com/security/cve/CVE-2013-2470.html
   http://support.novell.com/security/cve/CVE-2013-2471.html
   http://support.novell.com/security/cve/CVE-2013-2472.html
   http://support.novell.com/security/cve/CVE-2013-2473.html
   http://support.novell.com/security/cve/CVE-2013-3009.html
   http://support.novell.com/security/cve/CVE-2013-3011.html
   http://support.novell.com/security/cve/CVE-2013-3012.html
   http://support.novell.com/security/cve/CVE-2013-3743.html
   http://support.novell.com/security/cve/CVE-2013-4002.html
   https://bugzilla.novell.com/817062
   https://bugzilla.novell.com/823034
   https://bugzilla.novell.com/829212
   http://download.novell.com/patch/finder/?keywords=4ed92cf0de9b3b679aefd2605f9c3f66



More information about the sle-security-updates mailing list