SUSE-SU-2014:0728-3: important: Security update for IBM Java 6
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Mon Jun 2 17:04:14 MDT 2014
SUSE Security Update: Security update for IBM Java 6
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0728-3
Rating: important
References: #877430
Cross-References: CVE-2013-6629 CVE-2013-6954 CVE-2014-0428
CVE-2014-0429 CVE-2014-0446 CVE-2014-0449
CVE-2014-0451 CVE-2014-0452 CVE-2014-0453
CVE-2014-0457 CVE-2014-0458 CVE-2014-0459
CVE-2014-0460 CVE-2014-0461 CVE-2014-0878
CVE-2014-1876 CVE-2014-2398 CVE-2014-2401
CVE-2014-2409 CVE-2014-2412 CVE-2014-2414
CVE-2014-2420 CVE-2014-2421 CVE-2014-2423
CVE-2014-2427 CVE-2014-2428
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP1 LTSS
SUSE Linux Enterprise Java 11 SP3
______________________________________________________________________________
An update that fixes 26 vulnerabilities is now available.
Description:
BM Java 6 was updated to version 6 SR16 to fix several security issues and
various other bugs.
More information can be found at:
http://www.ibm.com/developerworks/java/jdk/alerts/
<http://www.ibm.com/developerworks/java/jdk/alerts/>
Security Issues references:
* CVE-2013-6629
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629>
* CVE-2013-6954
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954>
* CVE-2014-0429
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429>
* CVE-2014-0446
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446>
* CVE-2014-0449
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0449>
* CVE-2014-0451
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451>
* CVE-2014-0452
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452>
* CVE-2014-0457
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457>
* CVE-2014-0458
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458>
* CVE-2014-0459
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459>
* CVE-2014-0460
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460>
* CVE-2014-0461
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461>
* CVE-2014-1876
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876>
* CVE-2014-2398
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398>
* CVE-2014-2401
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2401>
* CVE-2014-2409
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2409>
* CVE-2014-2412
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412>
* CVE-2014-2414
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414>
* CVE-2014-2420
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2420>
* CVE-2014-2421
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421>
* CVE-2014-2423
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423>
* CVE-2014-2427
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427>
* CVE-2014-2428
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2428>
* CVE-2014-0428
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428>
* CVE-2014-0453
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453>
* CVE-2014-0878
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0878>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-java-1_6_0-ibm-9256
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-java-1_6_0-ibm-9256
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-java-1_6_0-ibm-9256
- SUSE Linux Enterprise Server 11 SP1 LTSS:
zypper in -t patch slessp1-java-1_6_0-ibm-9273
- SUSE Linux Enterprise Java 11 SP3:
zypper in -t patch slejsp3-java-1_6_0-ibm-9256
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ppc64 s390x x86_64):
java-1_6_0-ibm-devel-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):
java-1_6_0-ibm-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
java-1_6_0-ibm-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586):
java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ppc64 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Server 11 SP3 (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Server 11 SP3 (i586):
java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586):
java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Java 11 SP3 (i586 ppc64 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-devel-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Java 11 SP3 (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Java 11 SP3 (i586):
java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1
References:
http://support.novell.com/security/cve/CVE-2013-6629.html
http://support.novell.com/security/cve/CVE-2013-6954.html
http://support.novell.com/security/cve/CVE-2014-0428.html
http://support.novell.com/security/cve/CVE-2014-0429.html
http://support.novell.com/security/cve/CVE-2014-0446.html
http://support.novell.com/security/cve/CVE-2014-0449.html
http://support.novell.com/security/cve/CVE-2014-0451.html
http://support.novell.com/security/cve/CVE-2014-0452.html
http://support.novell.com/security/cve/CVE-2014-0453.html
http://support.novell.com/security/cve/CVE-2014-0457.html
http://support.novell.com/security/cve/CVE-2014-0458.html
http://support.novell.com/security/cve/CVE-2014-0459.html
http://support.novell.com/security/cve/CVE-2014-0460.html
http://support.novell.com/security/cve/CVE-2014-0461.html
http://support.novell.com/security/cve/CVE-2014-0878.html
http://support.novell.com/security/cve/CVE-2014-1876.html
http://support.novell.com/security/cve/CVE-2014-2398.html
http://support.novell.com/security/cve/CVE-2014-2401.html
http://support.novell.com/security/cve/CVE-2014-2409.html
http://support.novell.com/security/cve/CVE-2014-2412.html
http://support.novell.com/security/cve/CVE-2014-2414.html
http://support.novell.com/security/cve/CVE-2014-2420.html
http://support.novell.com/security/cve/CVE-2014-2421.html
http://support.novell.com/security/cve/CVE-2014-2423.html
http://support.novell.com/security/cve/CVE-2014-2427.html
http://support.novell.com/security/cve/CVE-2014-2428.html
https://bugzilla.novell.com/877430
http://download.suse.com/patch/finder/?keywords=159cbf841fa77a526042b13b2fa5ba4b
http://download.suse.com/patch/finder/?keywords=ae93268c78a2b60a14d572b620ac3add
More information about the sle-security-updates
mailing list