SUSE-SU-2013:1263-2: important: Security update for java-1_5_0-ibm
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Jul 30 09:04:08 MDT 2013
SUSE Security Update: Security update for java-1_5_0-ibm
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1263-2
Rating: important
References: #817062 #823034 #829212
Cross-References: CVE-2013-1500 CVE-2013-1571 CVE-2013-2443
CVE-2013-2444 CVE-2013-2446 CVE-2013-2447
CVE-2013-2448 CVE-2013-2450 CVE-2013-2452
CVE-2013-2454 CVE-2013-2455 CVE-2013-2456
CVE-2013-2457 CVE-2013-2459 CVE-2013-2463
CVE-2013-2464 CVE-2013-2465 CVE-2013-2469
CVE-2013-2470 CVE-2013-2471 CVE-2013-2472
CVE-2013-2473 CVE-2013-3009 CVE-2013-3011
CVE-2013-3012 CVE-2013-3743 CVE-2013-4002
Affected Products:
SUSE Linux Enterprise Server 10 SP3 LTSS
______________________________________________________________________________
An update that fixes 27 vulnerabilities is now available.
Description:
IBM Java 1.5.0 was updated to SR16-FP3 to fix bugs and
security issues:
CVE-2013-3009, CVE-2013-3011, CVE-2013-3012, CVE-2013-4002,
CVE-2013-2469, CVE-2013-2465, CVE-2013-2464,
CVE-2013-2463, CVE-2013-2473, CVE-2013-2472,
CVE-2013-2471, CVE-2013-2470, CVE-2013-2459, CVE-2013-3743,
CVE-2013-2448, CVE-2013-2454, CVE-2013-2456,
CVE-2013-2457, CVE-2013-2455, CVE-2013-2443,
CVE-2013-2447, CVE-2013-2444, CVE-2013-2452, CVE-2013-2446,
CVE-2013-2450, CVE-2013-1571, CVE-2013-1500
Please see also
http://www.ibm.com/developerworks/java/jdk/alerts/
Additionally, the following bugs have been fixed: - Add
Europe/Busingen to tzmappings (bnc#817062) - Mark files in
jre/bin and bin/ as executable (bnc#823034).
Security Issues:
* CVE-2013-3009
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009
>
* CVE-2013-3011
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011
>
* CVE-2013-3012
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012
>
* CVE-2013-2469
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469
>
* CVE-2013-4002
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
>
* CVE-2013-2465
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465
>
* CVE-2013-2464
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464
>
* CVE-2013-2463
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463
>
* CVE-2013-2473
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473
>
* CVE-2013-2472
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472
>
* CVE-2013-2471
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471
>
* CVE-2013-2470
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470
>
* CVE-2013-2459
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459
>
* CVE-2013-3743
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3743
>
* CVE-2013-2448
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448
>
* CVE-2013-2454
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454
>
* CVE-2013-2457
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457
>
* CVE-2013-2456
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456
>
* CVE-2013-2455
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455
>
* CVE-2013-2443
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443
>
* CVE-2013-2444
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444
>
* CVE-2013-2447
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447
>
* CVE-2013-2452
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452
>
* CVE-2013-2446
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446
>
* CVE-2013-2450
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450
>
* CVE-2013-1571
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571
>
* CVE-2013-1500
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500
>
Package List:
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):
java-1_5_0-ibm-1.5.0_sr16.3-0.5.1
java-1_5_0-ibm-devel-1.5.0_sr16.3-0.5.1
java-1_5_0-ibm-fonts-1.5.0_sr16.3-0.5.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):
java-1_5_0-ibm-32bit-1.5.0_sr16.3-0.5.1
java-1_5_0-ibm-devel-32bit-1.5.0_sr16.3-0.5.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (x86_64):
java-1_5_0-ibm-alsa-32bit-1.5.0_sr16.3-0.5.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586):
java-1_5_0-ibm-alsa-1.5.0_sr16.3-0.5.1
java-1_5_0-ibm-jdbc-1.5.0_sr16.3-0.5.1
java-1_5_0-ibm-plugin-1.5.0_sr16.3-0.5.1
References:
http://support.novell.com/security/cve/CVE-2013-1500.html
http://support.novell.com/security/cve/CVE-2013-1571.html
http://support.novell.com/security/cve/CVE-2013-2443.html
http://support.novell.com/security/cve/CVE-2013-2444.html
http://support.novell.com/security/cve/CVE-2013-2446.html
http://support.novell.com/security/cve/CVE-2013-2447.html
http://support.novell.com/security/cve/CVE-2013-2448.html
http://support.novell.com/security/cve/CVE-2013-2450.html
http://support.novell.com/security/cve/CVE-2013-2452.html
http://support.novell.com/security/cve/CVE-2013-2454.html
http://support.novell.com/security/cve/CVE-2013-2455.html
http://support.novell.com/security/cve/CVE-2013-2456.html
http://support.novell.com/security/cve/CVE-2013-2457.html
http://support.novell.com/security/cve/CVE-2013-2459.html
http://support.novell.com/security/cve/CVE-2013-2463.html
http://support.novell.com/security/cve/CVE-2013-2464.html
http://support.novell.com/security/cve/CVE-2013-2465.html
http://support.novell.com/security/cve/CVE-2013-2469.html
http://support.novell.com/security/cve/CVE-2013-2470.html
http://support.novell.com/security/cve/CVE-2013-2471.html
http://support.novell.com/security/cve/CVE-2013-2472.html
http://support.novell.com/security/cve/CVE-2013-2473.html
http://support.novell.com/security/cve/CVE-2013-3009.html
http://support.novell.com/security/cve/CVE-2013-3011.html
http://support.novell.com/security/cve/CVE-2013-3012.html
http://support.novell.com/security/cve/CVE-2013-3743.html
http://support.novell.com/security/cve/CVE-2013-4002.html
https://bugzilla.novell.com/817062
https://bugzilla.novell.com/823034
https://bugzilla.novell.com/829212
http://download.novell.com/patch/finder/?keywords=4829d9187c70595f2f4afabf4dcf6504
More information about the sle-security-updates
mailing list