SUSE-SU-2013:1677-2: important: Security update for Java 6
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Mon Nov 18 16:04:11 MST 2013
SUSE Security Update: Security update for Java 6
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1677-2
Rating: important
References: #849212
Cross-References: CVE-2013-3829 CVE-2013-4041 CVE-2013-5372
CVE-2013-5375 CVE-2013-5456 CVE-2013-5457
CVE-2013-5458 CVE-2013-5772 CVE-2013-5774
CVE-2013-5776 CVE-2013-5778 CVE-2013-5780
CVE-2013-5782 CVE-2013-5783 CVE-2013-5784
CVE-2013-5787 CVE-2013-5788 CVE-2013-5789
CVE-2013-5790 CVE-2013-5797 CVE-2013-5800
CVE-2013-5801 CVE-2013-5802 CVE-2013-5803
CVE-2013-5804 CVE-2013-5809 CVE-2013-5812
CVE-2013-5814 CVE-2013-5817 CVE-2013-5818
CVE-2013-5819 CVE-2013-5820 CVE-2013-5823
CVE-2013-5824 CVE-2013-5825 CVE-2013-5829
CVE-2013-5830 CVE-2013-5831 CVE-2013-5832
CVE-2013-5838 CVE-2013-5840 CVE-2013-5842
CVE-2013-5843 CVE-2013-5848 CVE-2013-5849
CVE-2013-5850 CVE-2013-5851
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP1 LTSS
SUSE Linux Enterprise Server 10 SP4 LTSS
SUSE Linux Enterprise Server 10 SP3 LTSS
SUSE Linux Enterprise Java 11 SP3
SUSE Linux Enterprise Java 11 SP2
______________________________________________________________________________
An update that fixes 47 vulnerabilities is now available.
Description:
IBM Java 6 SR15 has been released which fixes lots of bugs
and security issues.
More information can be found on:
http://www.ibm.com/developerworks/java/jdk/alerts/
<http://www.ibm.com/developerworks/java/jdk/alerts/>
Security Issue references:
* CVE-2013-5458
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458
>
* CVE-2013-5456
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456
>
* CVE-2013-5457
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457
>
* CVE-2013-4041
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041
>
* CVE-2013-5375
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375
>
* CVE-2013-5372
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372
>
* CVE-2013-5843
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
>
* CVE-2013-5789
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
>
* CVE-2013-5830
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
>
* CVE-2013-5829
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
>
* CVE-2013-5787
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
>
* CVE-2013-5788
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788
>
* CVE-2013-5824
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
>
* CVE-2013-5842
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
>
* CVE-2013-5782
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
>
* CVE-2013-5817
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
>
* CVE-2013-5809
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
>
* CVE-2013-5814
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
>
* CVE-2013-5832
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832
>
* CVE-2013-5850
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850
>
* CVE-2013-5838
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838
>
* CVE-2013-5802
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
>
* CVE-2013-5812
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
>
* CVE-2013-5804
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
>
* CVE-2013-5783
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
>
* CVE-2013-3829
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
>
* CVE-2013-5823
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
>
* CVE-2013-5831
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
>
* CVE-2013-5820
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
>
* CVE-2013-5819
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
>
* CVE-2013-5818
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
>
* CVE-2013-5848
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
>
* CVE-2013-5776
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
>
* CVE-2013-5774
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
>
* CVE-2013-5825
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
>
* CVE-2013-5840
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
>
* CVE-2013-5801
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
>
* CVE-2013-5778
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
>
* CVE-2013-5851
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851
>
* CVE-2013-5800
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800
>
* CVE-2013-5784
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
>
* CVE-2013-5849
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
>
* CVE-2013-5790
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
>
* CVE-2013-5780
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
>
* CVE-2013-5797
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
>
* CVE-2013-5803
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
>
* CVE-2013-5772
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-java-1_6_0-ibm-8550
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp2-java-1_6_0-ibm-8549
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-java-1_6_0-ibm-8550
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-java-1_6_0-ibm-8550
- SUSE Linux Enterprise Server 11 SP2 for VMware:
zypper in -t patch slessp2-java-1_6_0-ibm-8549
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp2-java-1_6_0-ibm-8549
- SUSE Linux Enterprise Server 11 SP1 LTSS:
zypper in -t patch slessp1-java-1_6_0-ibm-8557
- SUSE Linux Enterprise Java 11 SP3:
zypper in -t patch slejsp3-java-1_6_0-ibm-8550
- SUSE Linux Enterprise Java 11 SP2:
zypper in -t patch slejsp2-java-1_6_0-ibm-8549
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ppc64 s390x x86_64):
java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):
java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 s390x x86_64):
java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):
java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586):
java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ppc64 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP3 (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP3 (i586):
java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):
java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586):
java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ppc64 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP2 (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP2 (i586):
java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586):
java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr15.0-0.14.1
java-1_6_0-ibm-devel-1.6.0_sr15.0-0.14.1
java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.14.1
java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.14.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):
java-1_6_0-ibm-32bit-1.6.0_sr15.0-0.14.1
java-1_6_0-ibm-devel-32bit-1.6.0_sr15.0-0.14.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.14.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (x86_64):
java-1_6_0-ibm-alsa-32bit-1.6.0_sr15.0-0.14.1
java-1_6_0-ibm-plugin-32bit-1.6.0_sr15.0-0.14.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586):
java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.14.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr15.0-0.9.9.1
java-1_6_0-ibm-devel-1.6.0_sr15.0-0.9.9.1
java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.9.9.1
java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.9.9.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):
java-1_6_0-ibm-32bit-1.6.0_sr15.0-0.9.9.1
java-1_6_0-ibm-devel-32bit-1.6.0_sr15.0-0.9.9.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.9.9.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (x86_64):
java-1_6_0-ibm-alsa-32bit-1.6.0_sr15.0-0.9.9.1
java-1_6_0-ibm-plugin-32bit-1.6.0_sr15.0-0.9.9.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586):
java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.9.9.1
- SUSE Linux Enterprise Java 11 SP3 (i586 ppc64 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Java 11 SP3 (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Java 11 SP3 (i586):
java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1
java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Java 11 SP2 (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1
- SUSE Linux Enterprise Java 11 SP2 (i586):
java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1
References:
http://support.novell.com/security/cve/CVE-2013-3829.html
http://support.novell.com/security/cve/CVE-2013-4041.html
http://support.novell.com/security/cve/CVE-2013-5372.html
http://support.novell.com/security/cve/CVE-2013-5375.html
http://support.novell.com/security/cve/CVE-2013-5456.html
http://support.novell.com/security/cve/CVE-2013-5457.html
http://support.novell.com/security/cve/CVE-2013-5458.html
http://support.novell.com/security/cve/CVE-2013-5772.html
http://support.novell.com/security/cve/CVE-2013-5774.html
http://support.novell.com/security/cve/CVE-2013-5776.html
http://support.novell.com/security/cve/CVE-2013-5778.html
http://support.novell.com/security/cve/CVE-2013-5780.html
http://support.novell.com/security/cve/CVE-2013-5782.html
http://support.novell.com/security/cve/CVE-2013-5783.html
http://support.novell.com/security/cve/CVE-2013-5784.html
http://support.novell.com/security/cve/CVE-2013-5787.html
http://support.novell.com/security/cve/CVE-2013-5788.html
http://support.novell.com/security/cve/CVE-2013-5789.html
http://support.novell.com/security/cve/CVE-2013-5790.html
http://support.novell.com/security/cve/CVE-2013-5797.html
http://support.novell.com/security/cve/CVE-2013-5800.html
http://support.novell.com/security/cve/CVE-2013-5801.html
http://support.novell.com/security/cve/CVE-2013-5802.html
http://support.novell.com/security/cve/CVE-2013-5803.html
http://support.novell.com/security/cve/CVE-2013-5804.html
http://support.novell.com/security/cve/CVE-2013-5809.html
http://support.novell.com/security/cve/CVE-2013-5812.html
http://support.novell.com/security/cve/CVE-2013-5814.html
http://support.novell.com/security/cve/CVE-2013-5817.html
http://support.novell.com/security/cve/CVE-2013-5818.html
http://support.novell.com/security/cve/CVE-2013-5819.html
http://support.novell.com/security/cve/CVE-2013-5820.html
http://support.novell.com/security/cve/CVE-2013-5823.html
http://support.novell.com/security/cve/CVE-2013-5824.html
http://support.novell.com/security/cve/CVE-2013-5825.html
http://support.novell.com/security/cve/CVE-2013-5829.html
http://support.novell.com/security/cve/CVE-2013-5830.html
http://support.novell.com/security/cve/CVE-2013-5831.html
http://support.novell.com/security/cve/CVE-2013-5832.html
http://support.novell.com/security/cve/CVE-2013-5838.html
http://support.novell.com/security/cve/CVE-2013-5840.html
http://support.novell.com/security/cve/CVE-2013-5842.html
http://support.novell.com/security/cve/CVE-2013-5843.html
http://support.novell.com/security/cve/CVE-2013-5848.html
http://support.novell.com/security/cve/CVE-2013-5849.html
http://support.novell.com/security/cve/CVE-2013-5850.html
http://support.novell.com/security/cve/CVE-2013-5851.html
https://bugzilla.novell.com/849212
http://download.novell.com/patch/finder/?keywords=17a9db88ef351844a3d8a3520e5c917e
http://download.novell.com/patch/finder/?keywords=59cacab82a07026e7b534dd6b64bd1d7
http://download.novell.com/patch/finder/?keywords=63037b81cb4f45a6e8f55663f0b31d59
http://download.novell.com/patch/finder/?keywords=92a6b678be36dd2d8ecf92f74430bc5b
http://download.novell.com/patch/finder/?keywords=bfac4cdb47e4e4279150421690839df9
More information about the sle-security-updates
mailing list