Security update for java-1_6_0-ibm
SUSE Security Update: Security update for java-1_6_0-ibm
IBM Java 1.6.0 has been updated to SR14 to fix bugs and
security issues.
Please see also
http://www.ibm.com/developerworks/java/jdk/alerts/
Also the following bugs have been fixed:
* add Europe/Busingen to tzmappings (bnc#817062)
* mark files in jre/bin and bin/ as executable
(bnc#823034)
Security Issue references:
* CVE-2013-3009
>
* CVE-2013-3011
>
* CVE-2013-3012
>
* CVE-2013-4002
>
* CVE-2013-2468
>
* CVE-2013-2469
>
* CVE-2013-2465
>
* CVE-2013-2464
>
* CVE-2013-2463
>
* CVE-2013-2473
>
* CVE-2013-2472
>
* CVE-2013-2471
>
* CVE-2013-2470
>
* CVE-2013-2459
>
* CVE-2013-2466
>
* CVE-2013-3743
>
* CVE-2013-2448
>
* CVE-2013-2442
>
* CVE-2013-2407
>
* CVE-2013-2454
>
* CVE-2013-2456
>
* CVE-2013-2453
>
* CVE-2013-2457
>
* CVE-2013-2455
>
* CVE-2013-2412
>
* CVE-2013-2443
>
* CVE-2013-2447
>
* CVE-2013-2437
>
* CVE-2013-2444
>
* CVE-2013-2452
>
* CVE-2013-2446
>
* CVE-2013-2450
>
* CVE-2013-1571
>
* CVE-2013-2451
>
* CVE-2013-1500
>
Announcement ID: | SUSE-SU-2013:1255-2 |
Rating: | important |
References: | #817062 #823034 #829212 |
Affected Products: |
An update that fixes 35 vulnerabilities is now available.
Description:
IBM Java 1.6.0 has been updated to SR14 to fix bugs and
security issues.
Please see also
http://www.ibm.com/developerworks/java/jdk/alerts/
Also the following bugs have been fixed:
* add Europe/Busingen to tzmappings (bnc#817062)
* mark files in jre/bin and bin/ as executable
(bnc#823034)
Security Issue references:
* CVE-2013-3009
* CVE-2013-3011
* CVE-2013-3012
* CVE-2013-4002
* CVE-2013-2468
* CVE-2013-2469
* CVE-2013-2465
* CVE-2013-2464
* CVE-2013-2463
* CVE-2013-2473
* CVE-2013-2472
* CVE-2013-2471
* CVE-2013-2470
* CVE-2013-2459
* CVE-2013-2466
* CVE-2013-3743
* CVE-2013-2448
* CVE-2013-2442
* CVE-2013-2407
* CVE-2013-2454
* CVE-2013-2456
* CVE-2013-2453
* CVE-2013-2457
* CVE-2013-2455
* CVE-2013-2412
* CVE-2013-2443
* CVE-2013-2447
* CVE-2013-2437
* CVE-2013-2444
* CVE-2013-2452
* CVE-2013-2446
* CVE-2013-2450
* CVE-2013-1571
* CVE-2013-2451
* CVE-2013-1500
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp2-java-1_6_0-ibm-8107
- SUSE Linux Enterprise Server 11 SP2 for VMware:
zypper in -t patch slessp2-java-1_6_0-ibm-8107
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp2-java-1_6_0-ibm-8107
- SUSE Linux Enterprise Java 11 SP2:
zypper in -t patch slejsp2-java-1_6_0-ibm-8107
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 s390x x86_64):
- java-1_6_0-ibm-devel-1.6.0_sr14.0-0.3.1
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):
- java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
- java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):
- java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
- java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
- java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1
- java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586):
- java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ppc64 s390x x86_64):
- java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
- java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
- java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1
- SUSE Linux Enterprise Server 11 SP2 (i586 x86_64):
- java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1
- SUSE Linux Enterprise Server 11 SP2 (i586):
- java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1
- SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64):
- java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
- java-1_6_0-ibm-devel-1.6.0_sr14.0-0.3.1
- java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
- java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1
- SUSE Linux Enterprise Java 11 SP2 (i586 x86_64):
- java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1
- SUSE Linux Enterprise Java 11 SP2 (i586):
- java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1
References:
- http://support.novell.com/security/cve/CVE-2013-1500.html
- http://support.novell.com/security/cve/CVE-2013-1571.html
- http://support.novell.com/security/cve/CVE-2013-2407.html
- http://support.novell.com/security/cve/CVE-2013-2412.html
- http://support.novell.com/security/cve/CVE-2013-2437.html
- http://support.novell.com/security/cve/CVE-2013-2442.html
- http://support.novell.com/security/cve/CVE-2013-2443.html
- http://support.novell.com/security/cve/CVE-2013-2444.html
- http://support.novell.com/security/cve/CVE-2013-2446.html
- http://support.novell.com/security/cve/CVE-2013-2447.html
- http://support.novell.com/security/cve/CVE-2013-2448.html
- http://support.novell.com/security/cve/CVE-2013-2450.html
- http://support.novell.com/security/cve/CVE-2013-2451.html
- http://support.novell.com/security/cve/CVE-2013-2452.html
- http://support.novell.com/security/cve/CVE-2013-2453.html
- http://support.novell.com/security/cve/CVE-2013-2454.html
- http://support.novell.com/security/cve/CVE-2013-2455.html
- http://support.novell.com/security/cve/CVE-2013-2456.html
- http://support.novell.com/security/cve/CVE-2013-2457.html
- http://support.novell.com/security/cve/CVE-2013-2459.html
- http://support.novell.com/security/cve/CVE-2013-2463.html
- http://support.novell.com/security/cve/CVE-2013-2464.html
- http://support.novell.com/security/cve/CVE-2013-2465.html
- http://support.novell.com/security/cve/CVE-2013-2466.html
- http://support.novell.com/security/cve/CVE-2013-2468.html
- http://support.novell.com/security/cve/CVE-2013-2469.html
- http://support.novell.com/security/cve/CVE-2013-2470.html
- http://support.novell.com/security/cve/CVE-2013-2471.html
- http://support.novell.com/security/cve/CVE-2013-2472.html
- http://support.novell.com/security/cve/CVE-2013-2473.html
- http://support.novell.com/security/cve/CVE-2013-3009.html
- http://support.novell.com/security/cve/CVE-2013-3011.html
- http://support.novell.com/security/cve/CVE-2013-3012.html
- http://support.novell.com/security/cve/CVE-2013-3743.html
- http://support.novell.com/security/cve/CVE-2013-4002.html
- https://bugzilla.novell.com/817062
- https://bugzilla.novell.com/823034
- https://bugzilla.novell.com/829212
- http://download.suse.com/patch/finder/?keywords=fb449952ea439a5cac5ed9583009a7ca