SUSE-SU-2016:1388-1: important: Security update for IBM Java 1.6.0

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue May 24 06:08:00 MDT 2016


   SUSE Security Update: Security update for IBM Java 1.6.0
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:1388-1
Rating:             important
References:         #977646 #977648 #977650 #979252 
Cross-References:   CVE-2016-0264 CVE-2016-0363 CVE-2016-0376
                    CVE-2016-0686 CVE-2016-0687 CVE-2016-3422
                    CVE-2016-3426 CVE-2016-3427 CVE-2016-3443
                    CVE-2016-3449
Affected Products:
                    SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________

   An update that fixes 10 vulnerabilities is now available.

Description:


   This IBM Java 1.6.0 SR16 FP25 release fixes the following issues:

   Security issues fixed:

       * CVE-2016-0264: buffer overflow vulnerability in the IBM JVM
         (bsc#977648)
       * CVE-2016-0363: insecure use of invoke method in CORBA component,
         incorrect CVE-2013-3009 fix (bsc#977650)
       * CVE-2016-0376: insecure deserialization in CORBA, incorrect
         CVE-2013-5456 fix (bsc#977646)
       * The following CVEs got also fixed during this update. (bsc#979252)
         CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427,
         CVE-2016-3449, CVE-2016-3422, CVE-2016-3426

   Security Issues:

       * CVE-2016-0376
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0376>
       * CVE-2016-0363
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0363>
       * CVE-2016-0264
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0264>
       * CVE-2016-3443
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3443>
       * CVE-2016-0687
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687>
       * CVE-2016-0686
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686>
       * CVE-2016-3427
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427>
       * CVE-2016-3449
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3449>
       * CVE-2016-3422
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3422>
       * CVE-2016-3426
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426>



Package List:

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr16.25-0.11.1
      java-1_6_0-ibm-devel-1.6.0_sr16.25-0.11.1
      java-1_6_0-ibm-fonts-1.6.0_sr16.25-0.11.1
      java-1_6_0-ibm-jdbc-1.6.0_sr16.25-0.11.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):

      java-1_6_0-ibm-32bit-1.6.0_sr16.25-0.11.1
      java-1_6_0-ibm-devel-32bit-1.6.0_sr16.25-0.11.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr16.25-0.11.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (x86_64):

      java-1_6_0-ibm-alsa-32bit-1.6.0_sr16.25-0.11.1
      java-1_6_0-ibm-plugin-32bit-1.6.0_sr16.25-0.11.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr16.25-0.11.1


References:

   https://www.suse.com/security/cve/CVE-2016-0264.html
   https://www.suse.com/security/cve/CVE-2016-0363.html
   https://www.suse.com/security/cve/CVE-2016-0376.html
   https://www.suse.com/security/cve/CVE-2016-0686.html
   https://www.suse.com/security/cve/CVE-2016-0687.html
   https://www.suse.com/security/cve/CVE-2016-3422.html
   https://www.suse.com/security/cve/CVE-2016-3426.html
   https://www.suse.com/security/cve/CVE-2016-3427.html
   https://www.suse.com/security/cve/CVE-2016-3443.html
   https://www.suse.com/security/cve/CVE-2016-3449.html
   https://bugzilla.suse.com/977646
   https://bugzilla.suse.com/977648
   https://bugzilla.suse.com/977650
   https://bugzilla.suse.com/979252
   https://download.suse.com/patch/finder/?keywords=133b4d37ec640a121ad2dbcba2704f70



More information about the sle-updates mailing list