SUSE-SU-2013:1264-1: important: Security update for java-1_4_2-ibm
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Sat Jul 27 09:04:19 MDT 2013
SUSE Security Update: Security update for java-1_4_2-ibm
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1264-1
Rating: important
References: #823034 #829212
Cross-References: CVE-2013-1500 CVE-2013-2446 CVE-2013-2447
CVE-2013-2450 CVE-2013-2452 CVE-2013-2456
CVE-2013-2459 CVE-2013-2463 CVE-2013-2464
CVE-2013-2465 CVE-2013-2469 CVE-2013-2470
CVE-2013-2471 CVE-2013-2472 CVE-2013-2473
CVE-2013-3009 CVE-2013-3011 CVE-2013-3012
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Java 11 SP2
SUSE Linux Enterprise Java 10 SP4
______________________________________________________________________________
An update that fixes 18 vulnerabilities is now available.
Description:
IBM Java 1.4.2 has been updated to SR13-FP18 to fix bugs
and security issues.
Please see also
http://www.ibm.com/developerworks/java/jdk/alerts/
<http://www.ibm.com/developerworks/java/jdk/alerts/>
Also the following bug has been fixed:
* mark files in jre/bin and bin/ as executable
(bnc#823034)
Security Issue references:
* CVE-2013-3009
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009
>
* CVE-2013-3011
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011
>
* CVE-2013-3012
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012
>
* CVE-2013-2469
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469
>
* CVE-2013-2465
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465
>
* CVE-2013-2464
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464
>
* CVE-2013-2463
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463
>
* CVE-2013-2473
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473
>
* CVE-2013-2472
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472
>
* CVE-2013-2471
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471
>
* CVE-2013-2470
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470
>
* CVE-2013-2459
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459
>
* CVE-2013-2456
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456
>
* CVE-2013-2447
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447
>
* CVE-2013-2452
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452
>
* CVE-2013-2446
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446
>
* CVE-2013-2450
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450
>
* CVE-2013-1500
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp2-java-1_4_2-ibm-8109
- SUSE Linux Enterprise Server 11 SP2 for VMware:
zypper in -t patch slessp2-java-1_4_2-ibm-8109
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp2-java-1_4_2-ibm-8109
- SUSE Linux Enterprise Java 11 SP2:
zypper in -t patch slejsp2-java-1_4_2-ibm-8109
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64):
java-1_4_2-ibm-devel-1.4.2_sr13.18-0.4.1
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):
java-1_4_2-ibm-1.4.2_sr13.18-0.4.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):
java-1_4_2-ibm-1.4.2_sr13.18-0.4.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586):
java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1
java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
java-1_4_2-ibm-1.4.2_sr13.18-0.4.1
- SUSE Linux Enterprise Server 11 SP2 (i586):
java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1
java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
java-1_4_2-ibm-1.4.2_sr13.18-0.7.1
java-1_4_2-ibm-devel-1.4.2_sr13.18-0.7.1
- SUSE Linux Enterprise Server 10 SP4 (i586 ppc):
java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.7.1
- SUSE Linux Enterprise Server 10 SP4 (i586):
java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.7.1
- SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64):
java-1_4_2-ibm-1.4.2_sr13.18-0.4.1
- SUSE Linux Enterprise Java 11 SP2 (i586):
java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1
java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1
- SUSE Linux Enterprise Java 10 SP4 (i586 ia64 ppc s390x x86_64):
java-1_4_2-ibm-1.4.2_sr13.18-0.7.1
java-1_4_2-ibm-devel-1.4.2_sr13.18-0.7.1
- SUSE Linux Enterprise Java 10 SP4 (i586 ppc):
java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.7.1
- SUSE Linux Enterprise Java 10 SP4 (i586):
java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.7.1
References:
http://support.novell.com/security/cve/CVE-2013-1500.html
http://support.novell.com/security/cve/CVE-2013-2446.html
http://support.novell.com/security/cve/CVE-2013-2447.html
http://support.novell.com/security/cve/CVE-2013-2450.html
http://support.novell.com/security/cve/CVE-2013-2452.html
http://support.novell.com/security/cve/CVE-2013-2456.html
http://support.novell.com/security/cve/CVE-2013-2459.html
http://support.novell.com/security/cve/CVE-2013-2463.html
http://support.novell.com/security/cve/CVE-2013-2464.html
http://support.novell.com/security/cve/CVE-2013-2465.html
http://support.novell.com/security/cve/CVE-2013-2469.html
http://support.novell.com/security/cve/CVE-2013-2470.html
http://support.novell.com/security/cve/CVE-2013-2471.html
http://support.novell.com/security/cve/CVE-2013-2472.html
http://support.novell.com/security/cve/CVE-2013-2473.html
http://support.novell.com/security/cve/CVE-2013-3009.html
http://support.novell.com/security/cve/CVE-2013-3011.html
http://support.novell.com/security/cve/CVE-2013-3012.html
https://bugzilla.novell.com/823034
https://bugzilla.novell.com/829212
http://download.novell.com/patch/finder/?keywords=399735ab8d205f1101d90585a46d9b56
http://download.novell.com/patch/finder/?keywords=cee913adfb40cb03092c372e3c78ba19
More information about the sle-security-updates
mailing list