LWN.net Logo

SUSE alert SUSE-SU-2013:1263-1 (java-1_5_0-ibm)

From:  opensuse-security@opensuse.org
To:  opensuse-security-announce@opensuse.org
Subject:  [security-announce] SUSE-SU-2013:1263-1: important: Security update for java-1_5_0-ibm
Date:  Sat, 27 Jul 2013 17:04:14 +0200 (CEST)
Message-ID:  <20130727150414.8F2F732060@maintenance.suse.de>
Archive-link:  Article, Thread

SUSE Security Update: Security update for java-1_5_0-ibm ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:1263-1 Rating: important References: #817062 #823034 #829212 Cross-References: CVE-2013-1500 CVE-2013-1571 CVE-2013-2443 CVE-2013-2444 CVE-2013-2446 CVE-2013-2447 CVE-2013-2448 CVE-2013-2450 CVE-2013-2452 CVE-2013-2454 CVE-2013-2455 CVE-2013-2456 CVE-2013-2457 CVE-2013-2459 CVE-2013-2463 CVE-2013-2464 CVE-2013-2465 CVE-2013-2469 CVE-2013-2470 CVE-2013-2471 CVE-2013-2472 CVE-2013-2473 CVE-2013-3009 CVE-2013-3011 CVE-2013-3012 CVE-2013-3743 CVE-2013-4002 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Java 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes 27 vulnerabilities is now available. Description: IBM Java 1.5.0 has been updated to SR16-FP3 to fix bugs and security issues. Please see also http://www.ibm.com/developerworks/java/jdk/alerts/ <http://www.ibm.com/developerworks/java/jdk/alerts/> Also the following bug has been fixed: * add Europe/Busingen to tzmappings (bnc#817062) * mark files in jre/bin and bin/ as executable (bnc#823034) Security Issue references: * CVE-2013-3009 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009 > * CVE-2013-3011 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011 > * CVE-2013-3012 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012 > * CVE-2013-4002 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002 > * CVE-2013-2469 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469 > * CVE-2013-2465 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465 > * CVE-2013-2464 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464 > * CVE-2013-2463 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463 > * CVE-2013-2473 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473 > * CVE-2013-2472 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472 > * CVE-2013-2471 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471 > * CVE-2013-2470 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470 > * CVE-2013-2459 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459 > * CVE-2013-3743 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3743 > * CVE-2013-2448 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448 > * CVE-2013-2454 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454 > * CVE-2013-2456 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456 > * CVE-2013-2457 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457 > * CVE-2013-2455 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455 > * CVE-2013-2443 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443 > * CVE-2013-2447 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447 > * CVE-2013-2444 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444 > * CVE-2013-2452 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452 > * CVE-2013-2446 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446 > * CVE-2013-2450 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450 > * CVE-2013-1571 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571 > * CVE-2013-1500 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500 > Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ppc s390x x86_64): java-1_5_0-ibm-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-devel-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-fonts-1.5.0_sr16.3-0.5.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): java-1_5_0-ibm-32bit-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-devel-32bit-1.5.0_sr16.3-0.5.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ppc): java-1_5_0-ibm-jdbc-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-plugin-1.5.0_sr16.3-0.5.1 - SUSE Linux Enterprise Server 10 SP4 (x86_64): java-1_5_0-ibm-alsa-32bit-1.5.0_sr16.3-0.5.1 - SUSE Linux Enterprise Server 10 SP4 (i586): java-1_5_0-ibm-alsa-1.5.0_sr16.3-0.5.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): java-1_5_0-ibm-64bit-1.5.0_sr16.3-0.5.1 - SUSE Linux Enterprise Java 10 SP4 (i586 ppc s390x x86_64): java-1_5_0-ibm-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-devel-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-fonts-1.5.0_sr16.3-0.5.1 - SUSE Linux Enterprise Java 10 SP4 (ppc): java-1_5_0-ibm-jdbc-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-plugin-1.5.0_sr16.3-0.5.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): java-1_5_0-ibm-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-demo-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-devel-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-fonts-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-src-1.5.0_sr16.3-0.5.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): java-1_5_0-ibm-32bit-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-alsa-32bit-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-devel-32bit-1.5.0_sr16.3-0.5.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586): java-1_5_0-ibm-alsa-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-jdbc-1.5.0_sr16.3-0.5.1 java-1_5_0-ibm-plugin-1.5.0_sr16.3-0.5.1 References: http://support.novell.com/security/cve/CVE-2013-1500.html http://support.novell.com/security/cve/CVE-2013-1571.html http://support.novell.com/security/cve/CVE-2013-2443.html http://support.novell.com/security/cve/CVE-2013-2444.html http://support.novell.com/security/cve/CVE-2013-2446.html http://support.novell.com/security/cve/CVE-2013-2447.html http://support.novell.com/security/cve/CVE-2013-2448.html http://support.novell.com/security/cve/CVE-2013-2450.html http://support.novell.com/security/cve/CVE-2013-2452.html http://support.novell.com/security/cve/CVE-2013-2454.html http://support.novell.com/security/cve/CVE-2013-2455.html http://support.novell.com/security/cve/CVE-2013-2456.html http://support.novell.com/security/cve/CVE-2013-2457.html http://support.novell.com/security/cve/CVE-2013-2459.html http://support.novell.com/security/cve/CVE-2013-2463.html http://support.novell.com/security/cve/CVE-2013-2464.html http://support.novell.com/security/cve/CVE-2013-2465.html http://support.novell.com/security/cve/CVE-2013-2469.html http://support.novell.com/security/cve/CVE-2013-2470.html http://support.novell.com/security/cve/CVE-2013-2471.html http://support.novell.com/security/cve/CVE-2013-2472.html http://support.novell.com/security/cve/CVE-2013-2473.html http://support.novell.com/security/cve/CVE-2013-3009.html http://support.novell.com/security/cve/CVE-2013-3011.html http://support.novell.com/security/cve/CVE-2013-3012.html http://support.novell.com/security/cve/CVE-2013-3743.html http://support.novell.com/security/cve/CVE-2013-4002.html https://bugzilla.novell.com/817062 https://bugzilla.novell.com/823034 https://bugzilla.novell.com/829212 http://download.novell.com/patch/finder/?keywords=4ed92cf... -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds