Security update for java-1_6_0-ibm

SUSE Security Update: Security update for java-1_6_0-ibm
Announcement ID: SUSE-SU-2013:1255-1
Rating: important
References: #817062 #823034 #829212
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP3
  • SUSE Linux Enterprise Server 11 SP3 for VMware
  • SUSE Linux Enterprise Server 11 SP3
  • SUSE Linux Enterprise Server 10 SP4
  • SUSE Linux Enterprise Java 11 SP3
  • SUSE Linux Enterprise Java 10 SP4

  • An update that fixes 35 vulnerabilities is now available.

    Description:


    IBM Java 1.6.0 has been updated to SR14 to fix bugs and
    security issues.

    Please see also
    http://www.ibm.com/developerworks/java/jdk/alerts/


    Also the following bugs have been fixed:

    * add Europe/Busingen to tzmappings (bnc#817062)
    * mark files in jre/bin and bin/ as executable
    (bnc#823034)

    Security Issue references:

    * CVE-2013-3009
    >
    * CVE-2013-3011
    >
    * CVE-2013-3012
    >
    * CVE-2013-4002
    >
    * CVE-2013-2468
    >
    * CVE-2013-2469
    >
    * CVE-2013-2465
    >
    * CVE-2013-2464
    >
    * CVE-2013-2463
    >
    * CVE-2013-2473
    >
    * CVE-2013-2472
    >
    * CVE-2013-2471
    >
    * CVE-2013-2470
    >
    * CVE-2013-2459
    >
    * CVE-2013-2466
    >
    * CVE-2013-3743
    >
    * CVE-2013-2448
    >
    * CVE-2013-2442
    >
    * CVE-2013-2407
    >
    * CVE-2013-2454
    >
    * CVE-2013-2456
    >
    * CVE-2013-2453
    >
    * CVE-2013-2457
    >
    * CVE-2013-2455
    >
    * CVE-2013-2412
    >
    * CVE-2013-2443
    >
    * CVE-2013-2447
    >
    * CVE-2013-2437
    >
    * CVE-2013-2444
    >
    * CVE-2013-2452
    >
    * CVE-2013-2446
    >
    * CVE-2013-2450
    >
    * CVE-2013-1571
    >
    * CVE-2013-2451
    >
    * CVE-2013-1500
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP3:
      zypper in -t patch sdksp3-java-1_6_0-ibm-8105
    • SUSE Linux Enterprise Server 11 SP3 for VMware:
      zypper in -t patch slessp3-java-1_6_0-ibm-8105
    • SUSE Linux Enterprise Server 11 SP3:
      zypper in -t patch slessp3-java-1_6_0-ibm-8105
    • SUSE Linux Enterprise Java 11 SP3:
      zypper in -t patch slejsp3-java-1_6_0-ibm-8105

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ppc64 s390x x86_64):
    • java-1_6_0-ibm-devel-1.6.0_sr14.0-0.3.1
    • SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):
    • java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
    • java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
    • SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
    • java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
    • java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
    • java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1
    • java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1
    • SUSE Linux Enterprise Server 11 SP3 for VMware (i586):
    • java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1
    • SUSE Linux Enterprise Server 11 SP3 (i586 ppc64 s390x x86_64):
    • java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
    • java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
    • java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1
    • SUSE Linux Enterprise Server 11 SP3 (i586 x86_64):
    • java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1
    • SUSE Linux Enterprise Server 11 SP3 (i586):
    • java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1
    • SUSE Linux Enterprise Server 10 SP4 (i586 ppc s390x x86_64):
    • java-1_6_0-ibm-1.6.0_sr14.0-0.11.1
    • java-1_6_0-ibm-devel-1.6.0_sr14.0-0.11.1
    • java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.11.1
    • java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.11.1
    • SUSE Linux Enterprise Server 10 SP4 (i586 ppc x86_64):
    • java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.11.1
    • SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
    • java-1_6_0-ibm-32bit-1.6.0_sr14.0-0.11.1
    • java-1_6_0-ibm-devel-32bit-1.6.0_sr14.0-0.11.1
    • SUSE Linux Enterprise Server 10 SP4 (x86_64):
    • java-1_6_0-ibm-alsa-32bit-1.6.0_sr14.0-0.11.1
    • java-1_6_0-ibm-plugin-32bit-1.6.0_sr14.0-0.11.1
    • SUSE Linux Enterprise Server 10 SP4 (i586):
    • java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.11.1
    • SUSE Linux Enterprise Server 10 SP4 (ppc):
    • java-1_6_0-ibm-64bit-1.6.0_sr14.0-0.11.1
    • SUSE Linux Enterprise Java 11 SP3 (i586 ppc64 s390x x86_64):
    • java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
    • java-1_6_0-ibm-devel-1.6.0_sr14.0-0.3.1
    • java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
    • java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1
    • SUSE Linux Enterprise Java 11 SP3 (i586 x86_64):
    • java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1
    • SUSE Linux Enterprise Java 11 SP3 (i586):
    • java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1
    • SUSE Linux Enterprise Java 10 SP4 (x86_64):
    • java-1_6_0-ibm-1.6.0_sr14.0-0.11.1
    • java-1_6_0-ibm-devel-1.6.0_sr14.0-0.11.1
    • java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.11.1
    • java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.11.1
    • java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.11.1

    References:

    • http://support.novell.com/security/cve/CVE-2013-1500.html
    • http://support.novell.com/security/cve/CVE-2013-1571.html
    • http://support.novell.com/security/cve/CVE-2013-2407.html
    • http://support.novell.com/security/cve/CVE-2013-2412.html
    • http://support.novell.com/security/cve/CVE-2013-2437.html
    • http://support.novell.com/security/cve/CVE-2013-2442.html
    • http://support.novell.com/security/cve/CVE-2013-2443.html
    • http://support.novell.com/security/cve/CVE-2013-2444.html
    • http://support.novell.com/security/cve/CVE-2013-2446.html
    • http://support.novell.com/security/cve/CVE-2013-2447.html
    • http://support.novell.com/security/cve/CVE-2013-2448.html
    • http://support.novell.com/security/cve/CVE-2013-2450.html
    • http://support.novell.com/security/cve/CVE-2013-2451.html
    • http://support.novell.com/security/cve/CVE-2013-2452.html
    • http://support.novell.com/security/cve/CVE-2013-2453.html
    • http://support.novell.com/security/cve/CVE-2013-2454.html
    • http://support.novell.com/security/cve/CVE-2013-2455.html
    • http://support.novell.com/security/cve/CVE-2013-2456.html
    • http://support.novell.com/security/cve/CVE-2013-2457.html
    • http://support.novell.com/security/cve/CVE-2013-2459.html
    • http://support.novell.com/security/cve/CVE-2013-2463.html
    • http://support.novell.com/security/cve/CVE-2013-2464.html
    • http://support.novell.com/security/cve/CVE-2013-2465.html
    • http://support.novell.com/security/cve/CVE-2013-2466.html
    • http://support.novell.com/security/cve/CVE-2013-2468.html
    • http://support.novell.com/security/cve/CVE-2013-2469.html
    • http://support.novell.com/security/cve/CVE-2013-2470.html
    • http://support.novell.com/security/cve/CVE-2013-2471.html
    • http://support.novell.com/security/cve/CVE-2013-2472.html
    • http://support.novell.com/security/cve/CVE-2013-2473.html
    • http://support.novell.com/security/cve/CVE-2013-3009.html
    • http://support.novell.com/security/cve/CVE-2013-3011.html
    • http://support.novell.com/security/cve/CVE-2013-3012.html
    • http://support.novell.com/security/cve/CVE-2013-3743.html
    • http://support.novell.com/security/cve/CVE-2013-4002.html
    • https://bugzilla.novell.com/817062
    • https://bugzilla.novell.com/823034
    • https://bugzilla.novell.com/829212
    • http://download.suse.com/patch/finder/?keywords=2506266f7074154371238b0be5bf61f3
    • http://download.suse.com/patch/finder/?keywords=d4115b4339a15f88677fc83a534c4dc3