SUSE-SU-2014:0728-2: important: Security update for IBM Java 6

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Thu May 29 18:04:30 MDT 2014


   SUSE Security Update: Security update for IBM Java 6
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:0728-2
Rating:             important
References:         #877430 
Cross-References:   CVE-2013-6629 CVE-2013-6954 CVE-2014-0428
                    CVE-2014-0429 CVE-2014-0446 CVE-2014-0449
                    CVE-2014-0451 CVE-2014-0452 CVE-2014-0453
                    CVE-2014-0457 CVE-2014-0458 CVE-2014-0459
                    CVE-2014-0460 CVE-2014-0461 CVE-2014-0878
                    CVE-2014-1876 CVE-2014-2398 CVE-2014-2401
                    CVE-2014-2409 CVE-2014-2412 CVE-2014-2414
                    CVE-2014-2420 CVE-2014-2421 CVE-2014-2423
                    CVE-2014-2427 CVE-2014-2428
Affected Products:
                    SUSE Linux Enterprise Server 11 SP2 LTSS
                    SUSE Linux Enterprise Server 10 SP4 LTSS
                    SUSE Linux Enterprise Server 10 SP3 LTSS
______________________________________________________________________________

   An update that fixes 26 vulnerabilities is now available.

Description:


   IBM Java 6 was updated to version 6 SR16 to fix several security issues
   and various other bugs.

   More information can be found at:
   http://www.ibm.com/developerworks/java/jdk/alerts/
   <http://www.ibm.com/developerworks/java/jdk/alerts/>

   Security Issues references:

       * CVE-2013-6629
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629>
       * CVE-2013-6954
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954>
       * CVE-2014-0429
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429>
       * CVE-2014-0446
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446>
       * CVE-2014-0449
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0449>
       * CVE-2014-0451
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451>
       * CVE-2014-0452
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452>
       * CVE-2014-0457
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457>
       * CVE-2014-0458
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458>
       * CVE-2014-0459
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459>
       * CVE-2014-0460
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460>
       * CVE-2014-0461
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461>
       * CVE-2014-1876
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876>
       * CVE-2014-2398
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398>
       * CVE-2014-2401
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2401>
       * CVE-2014-2409
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2409>
       * CVE-2014-2412
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412>
       * CVE-2014-2414
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414>
       * CVE-2014-2420
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2420>
       * CVE-2014-2421
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421>
       * CVE-2014-2423
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423>
       * CVE-2014-2427
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427>
       * CVE-2014-2428
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2428>
       * CVE-2014-0428
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428>
       * CVE-2014-0453
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453>
       * CVE-2014-0878
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0878>


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP2 LTSS:

      zypper in -t patch slessp2-java-1_6_0-ibm-9274

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr16.0-0.3.1
      java-1_6_0-ibm-devel-1.6.0_sr16.0-0.3.1
      java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3.1
      java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3.1

   - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3.1

   - SUSE Linux Enterprise Server 11 SP2 LTSS (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr16.0-0.8.1
      java-1_6_0-ibm-devel-1.6.0_sr16.0-0.8.1
      java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.8.1
      java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.8.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):

      java-1_6_0-ibm-32bit-1.6.0_sr16.0-0.8.1
      java-1_6_0-ibm-devel-32bit-1.6.0_sr16.0-0.8.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.8.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (x86_64):

      java-1_6_0-ibm-alsa-32bit-1.6.0_sr16.0-0.8.1
      java-1_6_0-ibm-plugin-32bit-1.6.0_sr16.0-0.8.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.8.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr16.0-0.5.1
      java-1_6_0-ibm-devel-1.6.0_sr16.0-0.5.1
      java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.5.1
      java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.5.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):

      java-1_6_0-ibm-32bit-1.6.0_sr16.0-0.5.1
      java-1_6_0-ibm-devel-32bit-1.6.0_sr16.0-0.5.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.5.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (x86_64):

      java-1_6_0-ibm-alsa-32bit-1.6.0_sr16.0-0.5.1
      java-1_6_0-ibm-plugin-32bit-1.6.0_sr16.0-0.5.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.5.1


References:

   http://support.novell.com/security/cve/CVE-2013-6629.html
   http://support.novell.com/security/cve/CVE-2013-6954.html
   http://support.novell.com/security/cve/CVE-2014-0428.html
   http://support.novell.com/security/cve/CVE-2014-0429.html
   http://support.novell.com/security/cve/CVE-2014-0446.html
   http://support.novell.com/security/cve/CVE-2014-0449.html
   http://support.novell.com/security/cve/CVE-2014-0451.html
   http://support.novell.com/security/cve/CVE-2014-0452.html
   http://support.novell.com/security/cve/CVE-2014-0453.html
   http://support.novell.com/security/cve/CVE-2014-0457.html
   http://support.novell.com/security/cve/CVE-2014-0458.html
   http://support.novell.com/security/cve/CVE-2014-0459.html
   http://support.novell.com/security/cve/CVE-2014-0460.html
   http://support.novell.com/security/cve/CVE-2014-0461.html
   http://support.novell.com/security/cve/CVE-2014-0878.html
   http://support.novell.com/security/cve/CVE-2014-1876.html
   http://support.novell.com/security/cve/CVE-2014-2398.html
   http://support.novell.com/security/cve/CVE-2014-2401.html
   http://support.novell.com/security/cve/CVE-2014-2409.html
   http://support.novell.com/security/cve/CVE-2014-2412.html
   http://support.novell.com/security/cve/CVE-2014-2414.html
   http://support.novell.com/security/cve/CVE-2014-2420.html
   http://support.novell.com/security/cve/CVE-2014-2421.html
   http://support.novell.com/security/cve/CVE-2014-2423.html
   http://support.novell.com/security/cve/CVE-2014-2427.html
   http://support.novell.com/security/cve/CVE-2014-2428.html
   https://bugzilla.novell.com/877430
   http://download.suse.com/patch/finder/?keywords=8737d63fc5fbcb05aaf87bdb3c7840f5
   http://download.suse.com/patch/finder/?keywords=ae92cd41800301a5a62df344f420d99d
   http://download.suse.com/patch/finder/?keywords=e24327af0d6908f1ed88c62bf8453013



More information about the sle-security-updates mailing list