Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in java-1_6_0-ibm
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in java-1_6_0-ibm
ID: SUSE-SU-2013:1255-2
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Software Development Kit 11 SP2, SUSE Linux Enterprise Server 11 SP2, SUSE Linux Enterprise Server 11 SP2 for VMware, SUSE Linux Enterprise Java 11 SP2
Datum: So, 28. Juli 2013, 10:58
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2437
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2442
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2466
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3743
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
Applikationen: IBM JDK for Linux

Originalnachricht

   SUSE Security Update: Security update for java-1_6_0-ibm
______________________________________________________________________________

Announcement ID: SUSE-SU-2013:1255-2
Rating: important
References: #817062 #823034 #829212
Cross-References: CVE-2013-1500 CVE-2013-1571 CVE-2013-2407
CVE-2013-2412 CVE-2013-2437 CVE-2013-2442
CVE-2013-2443 CVE-2013-2444 CVE-2013-2446
CVE-2013-2447 CVE-2013-2448 CVE-2013-2450
CVE-2013-2451 CVE-2013-2452 CVE-2013-2453
CVE-2013-2454 CVE-2013-2455 CVE-2013-2456
CVE-2013-2457 CVE-2013-2459 CVE-2013-2463
CVE-2013-2464 CVE-2013-2465 CVE-2013-2466
CVE-2013-2468 CVE-2013-2469 CVE-2013-2470
CVE-2013-2471 CVE-2013-2472 CVE-2013-2473
CVE-2013-3009 CVE-2013-3011 CVE-2013-3012
CVE-2013-3743 CVE-2013-4002
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Java 11 SP2
______________________________________________________________________________

An update that fixes 35 vulnerabilities is now available.

Description:


IBM Java 1.6.0 has been updated to SR14 to fix bugs and
security issues.

Please see also
http://www.ibm.com/developerworks/java/jdk/alerts/
<http://www.ibm.com/developerworks/java/jdk/alerts/>

Also the following bugs have been fixed:

* add Europe/Busingen to tzmappings (bnc#817062)
* mark files in jre/bin and bin/ as executable
(bnc#823034)

Security Issue references:

* CVE-2013-3009
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009
>
* CVE-2013-3011
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011
>
* CVE-2013-3012
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012
>
* CVE-2013-4002
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
>
* CVE-2013-2468
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2468
>
* CVE-2013-2469
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469
>
* CVE-2013-2465
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465
>
* CVE-2013-2464
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464
>
* CVE-2013-2463
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463
>
* CVE-2013-2473
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473
>
* CVE-2013-2472
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472
>
* CVE-2013-2471
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471
>
* CVE-2013-2470
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470
>
* CVE-2013-2459
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459
>
* CVE-2013-2466
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2466
>
* CVE-2013-3743
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3743
>
* CVE-2013-2448
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448
>
* CVE-2013-2442
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2442
>
* CVE-2013-2407
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407
>
* CVE-2013-2454
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454
>
* CVE-2013-2456
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456
>
* CVE-2013-2453
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453
>
* CVE-2013-2457
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457
>
* CVE-2013-2455
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455
>
* CVE-2013-2412
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412
>
* CVE-2013-2443
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443
>
* CVE-2013-2447
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447
>
* CVE-2013-2437
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2437
>
* CVE-2013-2444
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444
>
* CVE-2013-2452
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452
>
* CVE-2013-2446
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446
>
* CVE-2013-2450
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450
>
* CVE-2013-1571
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571
>
* CVE-2013-2451
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451
>
* CVE-2013-1500
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500
>


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 11 SP2:

zypper in -t patch sdksp2-java-1_6_0-ibm-8107

- SUSE Linux Enterprise Server 11 SP2 for VMware:

zypper in -t patch slessp2-java-1_6_0-ibm-8107

- SUSE Linux Enterprise Server 11 SP2:

zypper in -t patch slessp2-java-1_6_0-ibm-8107

- SUSE Linux Enterprise Java 11 SP2:

zypper in -t patch slejsp2-java-1_6_0-ibm-8107

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 s390x
x86_64):

java-1_6_0-ibm-devel-1.6.0_sr14.0-0.3.1

- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):

java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1

- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1
java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1

- SUSE Linux Enterprise Server 11 SP2 for VMware (i586):

java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1

- SUSE Linux Enterprise Server 11 SP2 (i586 ppc64 s390x x86_64):

java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1

- SUSE Linux Enterprise Server 11 SP2 (i586 x86_64):

java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1

- SUSE Linux Enterprise Server 11 SP2 (i586):

java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1

- SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64):

java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
java-1_6_0-ibm-devel-1.6.0_sr14.0-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1

- SUSE Linux Enterprise Java 11 SP2 (i586 x86_64):

java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1

- SUSE Linux Enterprise Java 11 SP2 (i586):

java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1


References:

http://support.novell.com/security/cve/CVE-2013-1500.html
http://support.novell.com/security/cve/CVE-2013-1571.html
http://support.novell.com/security/cve/CVE-2013-2407.html
http://support.novell.com/security/cve/CVE-2013-2412.html
http://support.novell.com/security/cve/CVE-2013-2437.html
http://support.novell.com/security/cve/CVE-2013-2442.html
http://support.novell.com/security/cve/CVE-2013-2443.html
http://support.novell.com/security/cve/CVE-2013-2444.html
http://support.novell.com/security/cve/CVE-2013-2446.html
http://support.novell.com/security/cve/CVE-2013-2447.html
http://support.novell.com/security/cve/CVE-2013-2448.html
http://support.novell.com/security/cve/CVE-2013-2450.html
http://support.novell.com/security/cve/CVE-2013-2451.html
http://support.novell.com/security/cve/CVE-2013-2452.html
http://support.novell.com/security/cve/CVE-2013-2453.html
http://support.novell.com/security/cve/CVE-2013-2454.html
http://support.novell.com/security/cve/CVE-2013-2455.html
http://support.novell.com/security/cve/CVE-2013-2456.html
http://support.novell.com/security/cve/CVE-2013-2457.html
http://support.novell.com/security/cve/CVE-2013-2459.html
http://support.novell.com/security/cve/CVE-2013-2463.html
http://support.novell.com/security/cve/CVE-2013-2464.html
http://support.novell.com/security/cve/CVE-2013-2465.html
http://support.novell.com/security/cve/CVE-2013-2466.html
http://support.novell.com/security/cve/CVE-2013-2468.html
http://support.novell.com/security/cve/CVE-2013-2469.html
http://support.novell.com/security/cve/CVE-2013-2470.html
http://support.novell.com/security/cve/CVE-2013-2471.html
http://support.novell.com/security/cve/CVE-2013-2472.html
http://support.novell.com/security/cve/CVE-2013-2473.html
http://support.novell.com/security/cve/CVE-2013-3009.html
http://support.novell.com/security/cve/CVE-2013-3011.html
http://support.novell.com/security/cve/CVE-2013-3012.html
http://support.novell.com/security/cve/CVE-2013-3743.html
http://support.novell.com/security/cve/CVE-2013-4002.html
https://bugzilla.novell.com/817062
https://bugzilla.novell.com/823034
https://bugzilla.novell.com/829212
?keywords=fb449952ea439a5cac5ed9583009a7ca

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung