Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in IBM Java 1.6.0
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in IBM Java 1.6.0
ID: SUSE-SU-2013:0835-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server 10 SP4, SUSE Linux Enterprise Java 10 SP4, SUSE Linux Enterprise Software Development Kit 11 SP2, SUSE Linux Enterprise Server 11 SP2, SUSE Linux Enterprise Server 11 SP2 for VMware, SUSE Linux Enterprise Java 11 SP2
Datum: Mo, 27. Mai 2013, 17:12
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0401
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1540
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1563
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2394
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2417
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2424
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2429
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2432
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2433
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2435
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2440
Applikationen: IBM Java 1.6.0

Originalnachricht

   SUSE Security Update: Security update for IBM Java
______________________________________________________________________________

Announcement ID: SUSE-SU-2013:0835-1
Rating: important
References: #592934 #819288
Cross-References: CVE-2013-0401 CVE-2013-1491 CVE-2013-1537
CVE-2013-1540 CVE-2013-1557 CVE-2013-1563
CVE-2013-1569 CVE-2013-2383 CVE-2013-2384
CVE-2013-2394 CVE-2013-2417 CVE-2013-2418
CVE-2013-2419 CVE-2013-2420 CVE-2013-2422
CVE-2013-2424 CVE-2013-2429 CVE-2013-2430
CVE-2013-2432 CVE-2013-2433 CVE-2013-2435
CVE-2013-2440
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Java 11 SP2
SUSE Linux Enterprise Java 10 SP4
______________________________________________________________________________

An update that fixes 22 vulnerabilities is now available.

Description:


IBM Java 1.6.0 has been updated to SR13-FP2 fixing bugs and
security issues.

[http://www.ibm.com/developerworks/java/jdk/alerts/)(http://
www.ibm.com/developerworks/java/jdk/alerts/)

Security Issue references:

* CVE-2013-2422
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2422
>
* CVE-2013-1491
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1491
>
* CVE-2013-2435
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2435
>
* CVE-2013-2420
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420
>
* CVE-2013-2432
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2432
>
* CVE-2013-1569
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569
>
* CVE-2013-2384
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384
>
* CVE-2013-2383
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383
>
* CVE-2013-1557
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1557
>
* CVE-2013-1537
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537
>
* CVE-2013-2440
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2440
>
* CVE-2013-2429
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2429
>
* CVE-2013-2430
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2430
>
* CVE-2013-1563
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1563
>
* CVE-2013-2394
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2394
>
* CVE-2013-0401
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0401
>
* CVE-2013-2424
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2424
>
* CVE-2013-2419
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419
>
* CVE-2013-2417
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2417
>
* CVE-2013-2418
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2418
>
* CVE-2013-1540
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1540
>
* CVE-2013-2433
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2433
>


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 11 SP2:

zypper in -t patch sdksp2-java-1_6_0-ibm-7744

- SUSE Linux Enterprise Server 11 SP2 for VMware:

zypper in -t patch slessp2-java-1_6_0-ibm-7744

- SUSE Linux Enterprise Server 11 SP2:

zypper in -t patch slessp2-java-1_6_0-ibm-7744

- SUSE Linux Enterprise Java 11 SP2:

zypper in -t patch slejsp2-java-1_6_0-ibm-7744

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 s390x
x86_64):

java-1_6_0-ibm-devel-1.6.0_sr13.2-0.3.1

- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):

java-1_6_0-ibm-1.6.0_sr13.2-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3.1

- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

java-1_6_0-ibm-1.6.0_sr13.2-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3.1
java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3.1

- SUSE Linux Enterprise Server 11 SP2 for VMware (i586):

java-1_6_0-ibm-alsa-1.6.0_sr13.2-0.3.1

- SUSE Linux Enterprise Server 11 SP2 (i586 ppc64 s390x x86_64):

java-1_6_0-ibm-1.6.0_sr13.2-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3.1

- SUSE Linux Enterprise Server 11 SP2 (i586 x86_64):

java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3.1

- SUSE Linux Enterprise Server 11 SP2 (i586):

java-1_6_0-ibm-alsa-1.6.0_sr13.2-0.3.1

- SUSE Linux Enterprise Server 10 SP4 (i586 ppc s390x x86_64):

java-1_6_0-ibm-1.6.0_sr13.2-0.8.1
java-1_6_0-ibm-devel-1.6.0_sr13.2-0.8.1
java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.8.1
java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.8.1

- SUSE Linux Enterprise Server 10 SP4 (i586 ppc x86_64):

java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.8.1

- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):

java-1_6_0-ibm-32bit-1.6.0_sr13.2-0.8.1
java-1_6_0-ibm-devel-32bit-1.6.0_sr13.2-0.8.1

- SUSE Linux Enterprise Server 10 SP4 (x86_64):

java-1_6_0-ibm-alsa-32bit-1.6.0_sr13.2-0.8.1
java-1_6_0-ibm-plugin-32bit-1.6.0_sr13.2-0.8.1

- SUSE Linux Enterprise Server 10 SP4 (i586):

java-1_6_0-ibm-alsa-1.6.0_sr13.2-0.8.1

- SUSE Linux Enterprise Server 10 SP4 (ppc):

java-1_6_0-ibm-64bit-1.6.0_sr13.2-0.8.1

- SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64):

java-1_6_0-ibm-1.6.0_sr13.2-0.3.1
java-1_6_0-ibm-devel-1.6.0_sr13.2-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3.1

- SUSE Linux Enterprise Java 11 SP2 (i586 x86_64):

java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3.1

- SUSE Linux Enterprise Java 11 SP2 (i586):

java-1_6_0-ibm-alsa-1.6.0_sr13.2-0.3.1

- SUSE Linux Enterprise Java 10 SP4 (x86_64):

java-1_6_0-ibm-1.6.0_sr13.2-0.8.1
java-1_6_0-ibm-devel-1.6.0_sr13.2-0.8.1
java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.8.1
java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.8.1
java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.8.1


References:

http://support.novell.com/security/cve/CVE-2013-0401.html
http://support.novell.com/security/cve/CVE-2013-1491.html
http://support.novell.com/security/cve/CVE-2013-1537.html
http://support.novell.com/security/cve/CVE-2013-1540.html
http://support.novell.com/security/cve/CVE-2013-1557.html
http://support.novell.com/security/cve/CVE-2013-1563.html
http://support.novell.com/security/cve/CVE-2013-1569.html
http://support.novell.com/security/cve/CVE-2013-2383.html
http://support.novell.com/security/cve/CVE-2013-2384.html
http://support.novell.com/security/cve/CVE-2013-2394.html
http://support.novell.com/security/cve/CVE-2013-2417.html
http://support.novell.com/security/cve/CVE-2013-2418.html
http://support.novell.com/security/cve/CVE-2013-2419.html
http://support.novell.com/security/cve/CVE-2013-2420.html
http://support.novell.com/security/cve/CVE-2013-2422.html
http://support.novell.com/security/cve/CVE-2013-2424.html
http://support.novell.com/security/cve/CVE-2013-2429.html
http://support.novell.com/security/cve/CVE-2013-2430.html
http://support.novell.com/security/cve/CVE-2013-2432.html
http://support.novell.com/security/cve/CVE-2013-2433.html
http://support.novell.com/security/cve/CVE-2013-2435.html
http://support.novell.com/security/cve/CVE-2013-2440.html
https://bugzilla.novell.com/592934
https://bugzilla.novell.com/819288
?keywords=123f16c9260c506ce9b1083723f61ff8
?keywords=518ce3eb76af52a81202b66abe2dd0f2

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung