SUSE-SU-2013:1677-1: important: Security update for IBM Java 5
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Nov 14 16:04:32 MST 2013
SUSE Security Update: Security update for IBM Java 5
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1677-1
Rating: important
References: #849212
Cross-References: CVE-2013-3829 CVE-2013-4041 CVE-2013-5372
CVE-2013-5375 CVE-2013-5456 CVE-2013-5457
CVE-2013-5458 CVE-2013-5772 CVE-2013-5774
CVE-2013-5776 CVE-2013-5778 CVE-2013-5780
CVE-2013-5782 CVE-2013-5783 CVE-2013-5784
CVE-2013-5787 CVE-2013-5788 CVE-2013-5789
CVE-2013-5790 CVE-2013-5797 CVE-2013-5800
CVE-2013-5801 CVE-2013-5802 CVE-2013-5803
CVE-2013-5804 CVE-2013-5809 CVE-2013-5812
CVE-2013-5814 CVE-2013-5817 CVE-2013-5818
CVE-2013-5819 CVE-2013-5820 CVE-2013-5823
CVE-2013-5824 CVE-2013-5825 CVE-2013-5829
CVE-2013-5830 CVE-2013-5831 CVE-2013-5832
CVE-2013-5838 CVE-2013-5840 CVE-2013-5842
CVE-2013-5843 CVE-2013-5848 CVE-2013-5849
CVE-2013-5850 CVE-2013-5851
Affected Products:
SUSE CORE 9
______________________________________________________________________________
An update that fixes 47 vulnerabilities is now available.
Description:
IBM Java 5 SR16-FP4 has been released which fixes lots of
bugs and security issues.
More information can be found on:
http://www.ibm.com/developerworks/java/jdk/alerts/
<http://www.ibm.com/developerworks/java/jdk/alerts/>
Security Issue references:
* CVE-2013-5458
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458
>
* CVE-2013-5456
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456
>
* CVE-2013-5457
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457
>
* CVE-2013-4041
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041
>
* CVE-2013-5375
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375
>
* CVE-2013-5372
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372
>
* CVE-2013-5843
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
>
* CVE-2013-5789
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
>
* CVE-2013-5830
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
>
* CVE-2013-5829
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
>
* CVE-2013-5787
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
>
* CVE-2013-5788
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788
>
* CVE-2013-5824
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
>
* CVE-2013-5842
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
>
* CVE-2013-5782
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
>
* CVE-2013-5817
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
>
* CVE-2013-5809
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
>
* CVE-2013-5814
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
>
* CVE-2013-5832
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832
>
* CVE-2013-5850
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850
>
* CVE-2013-5838
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838
>
* CVE-2013-5802
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
>
* CVE-2013-5812
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
>
* CVE-2013-5804
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
>
* CVE-2013-5783
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
>
* CVE-2013-3829
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
>
* CVE-2013-5823
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
>
* CVE-2013-5831
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
>
* CVE-2013-5820
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
>
* CVE-2013-5819
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
>
* CVE-2013-5818
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
>
* CVE-2013-5848
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
>
* CVE-2013-5776
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
>
* CVE-2013-5774
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
>
* CVE-2013-5825
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
>
* CVE-2013-5840
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
>
* CVE-2013-5801
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
>
* CVE-2013-5778
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
>
* CVE-2013-5851
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851
>
* CVE-2013-5800
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800
>
* CVE-2013-5784
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
>
* CVE-2013-5849
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
>
* CVE-2013-5790
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
>
* CVE-2013-5780
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
>
* CVE-2013-5797
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
>
* CVE-2013-5803
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
>
* CVE-2013-5772
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
>
Package List:
- SUSE CORE 9 (i586 s390 s390x x86_64):
IBMJava5-JRE-1.5.0_sr16.4-0.4
IBMJava5-SDK-1.5.0_sr16.4-0.4
References:
http://support.novell.com/security/cve/CVE-2013-3829.html
http://support.novell.com/security/cve/CVE-2013-4041.html
http://support.novell.com/security/cve/CVE-2013-5372.html
http://support.novell.com/security/cve/CVE-2013-5375.html
http://support.novell.com/security/cve/CVE-2013-5456.html
http://support.novell.com/security/cve/CVE-2013-5457.html
http://support.novell.com/security/cve/CVE-2013-5458.html
http://support.novell.com/security/cve/CVE-2013-5772.html
http://support.novell.com/security/cve/CVE-2013-5774.html
http://support.novell.com/security/cve/CVE-2013-5776.html
http://support.novell.com/security/cve/CVE-2013-5778.html
http://support.novell.com/security/cve/CVE-2013-5780.html
http://support.novell.com/security/cve/CVE-2013-5782.html
http://support.novell.com/security/cve/CVE-2013-5783.html
http://support.novell.com/security/cve/CVE-2013-5784.html
http://support.novell.com/security/cve/CVE-2013-5787.html
http://support.novell.com/security/cve/CVE-2013-5788.html
http://support.novell.com/security/cve/CVE-2013-5789.html
http://support.novell.com/security/cve/CVE-2013-5790.html
http://support.novell.com/security/cve/CVE-2013-5797.html
http://support.novell.com/security/cve/CVE-2013-5800.html
http://support.novell.com/security/cve/CVE-2013-5801.html
http://support.novell.com/security/cve/CVE-2013-5802.html
http://support.novell.com/security/cve/CVE-2013-5803.html
http://support.novell.com/security/cve/CVE-2013-5804.html
http://support.novell.com/security/cve/CVE-2013-5809.html
http://support.novell.com/security/cve/CVE-2013-5812.html
http://support.novell.com/security/cve/CVE-2013-5814.html
http://support.novell.com/security/cve/CVE-2013-5817.html
http://support.novell.com/security/cve/CVE-2013-5818.html
http://support.novell.com/security/cve/CVE-2013-5819.html
http://support.novell.com/security/cve/CVE-2013-5820.html
http://support.novell.com/security/cve/CVE-2013-5823.html
http://support.novell.com/security/cve/CVE-2013-5824.html
http://support.novell.com/security/cve/CVE-2013-5825.html
http://support.novell.com/security/cve/CVE-2013-5829.html
http://support.novell.com/security/cve/CVE-2013-5830.html
http://support.novell.com/security/cve/CVE-2013-5831.html
http://support.novell.com/security/cve/CVE-2013-5832.html
http://support.novell.com/security/cve/CVE-2013-5838.html
http://support.novell.com/security/cve/CVE-2013-5840.html
http://support.novell.com/security/cve/CVE-2013-5842.html
http://support.novell.com/security/cve/CVE-2013-5843.html
http://support.novell.com/security/cve/CVE-2013-5848.html
http://support.novell.com/security/cve/CVE-2013-5849.html
http://support.novell.com/security/cve/CVE-2013-5850.html
http://support.novell.com/security/cve/CVE-2013-5851.html
https://bugzilla.novell.com/849212
http://download.novell.com/patch/finder/?keywords=ee3af08cb4368a9b3504c613b99084af
More information about the sle-security-updates
mailing list