Risks
Advisories
Browse
or
or
SUSE Security Update - java-1_6_0-ibm (SUSE-SU-2013:1255-1)
SUSE Security Update: Security update for java-1_6_0-ibm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1255-1
Rating:             important
References:         #817062 #823034 #829212
Cross-References:   CVE-2013-1500 CVE-2013-1571 CVE-2013-2407
                    CVE-2013-2412 CVE-2013-2437 CVE-2013-2442
                    CVE-2013-2443 CVE-2013-2444 CVE-2013-2446
                    CVE-2013-2447 CVE-2013-2448 CVE-2013-2450
                    CVE-2013-2451 CVE-2013-2452 CVE-2013-2453
                    CVE-2013-2454 CVE-2013-2455 CVE-2013-2456
                    CVE-2013-2457 CVE-2013-2459 CVE-2013-2463
                    CVE-2013-2464 CVE-2013-2465 CVE-2013-2466
                    CVE-2013-2468 CVE-2013-2469 CVE-2013-2470
                    CVE-2013-2471 CVE-2013-2472 CVE-2013-2473
                    CVE-2013-3009 CVE-2013-3011 CVE-2013-3012
                    CVE-2013-3743 CVE-2013-4002
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Server 11 SP3 for VMware
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Server 10 SP4
                    SUSE Linux Enterprise Java 11 SP3
                    SUSE Linux Enterprise Java 10 SP4
______________________________________________________________________________

   An update that fixes 35 vulnerabilities is now available.

Description:


   IBM Java 1.6.0 has been updated to SR14 to fix bugs and
   security issues.

   Please see also
   http://www.ibm.com/developerworks/java/jdk/alerts/
   <http://www.ibm.com/developerworks/java/jdk/alerts/>

   Also the following bugs have been fixed:

   * add Europe/Busingen to tzmappings (bnc#817062)
   * mark files in jre/bin and bin/ as executable
   (bnc#823034)

   Security Issue references:

   * CVE-2013-3009
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009
   >
   * CVE-2013-3011
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011
   >
   * CVE-2013-3012
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012
   >
   * CVE-2013-4002
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
   >
   * CVE-2013-2468
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2468
   >
   * CVE-2013-2469
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469
   >
   * CVE-2013-2465
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465
   >
   * CVE-2013-2464
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464
   >
   * CVE-2013-2463
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463
   >
   * CVE-2013-2473
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473
   >
   * CVE-2013-2472
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472
   >
   * CVE-2013-2471
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471
   >
   * CVE-2013-2470
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470
   >
   * CVE-2013-2459
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459
   >
   * CVE-2013-2466
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2466
   >
   * CVE-2013-3743
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3743
   >
   * CVE-2013-2448
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448
   >
   * CVE-2013-2442
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2442
   >
   * CVE-2013-2407
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407
   >
   * CVE-2013-2454
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454
   >
   * CVE-2013-2456
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456
   >
   * CVE-2013-2453
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453
   >
   * CVE-2013-2457
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457
   >
   * CVE-2013-2455
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455
   >
   * CVE-2013-2412
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412
   >
   * CVE-2013-2443
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443
   >
   * CVE-2013-2447
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447
   >
   * CVE-2013-2437
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2437
   >
   * CVE-2013-2444
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444
   >
   * CVE-2013-2452
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452
   >
   * CVE-2013-2446
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446
   >
   * CVE-2013-2450
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450
   >
   * CVE-2013-1571
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571
   >
   * CVE-2013-2451
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451
   >
   * CVE-2013-1500
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-java-1_6_0-ibm-8105

   - SUSE Linux Enterprise Server 11 SP3 for VMware:

      zypper in -t patch slessp3-java-1_6_0-ibm-8105

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-java-1_6_0-ibm-8105

   - SUSE Linux Enterprise Java 11 SP3:

      zypper in -t patch slejsp3-java-1_6_0-ibm-8105

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ppc64 s390x
x86_64):

      java-1_6_0-ibm-devel-1.6.0_sr14.0-0.3.1

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):

      java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
      java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

      java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
      java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
      java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1
      java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 ppc64 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
      java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
      java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1

   - SUSE Linux Enterprise Server 11 SP3 (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1

   - SUSE Linux Enterprise Server 10 SP4 (i586 ppc s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr14.0-0.11.1
      java-1_6_0-ibm-devel-1.6.0_sr14.0-0.11.1
      java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.11.1
      java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.11.1

   - SUSE Linux Enterprise Server 10 SP4 (i586 ppc x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.11.1

   - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):

      java-1_6_0-ibm-32bit-1.6.0_sr14.0-0.11.1
      java-1_6_0-ibm-devel-32bit-1.6.0_sr14.0-0.11.1

   - SUSE Linux Enterprise Server 10 SP4 (x86_64):

      java-1_6_0-ibm-alsa-32bit-1.6.0_sr14.0-0.11.1
      java-1_6_0-ibm-plugin-32bit-1.6.0_sr14.0-0.11.1

   - SUSE Linux Enterprise Server 10 SP4 (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.11.1

   - SUSE Linux Enterprise Server 10 SP4 (ppc):

      java-1_6_0-ibm-64bit-1.6.0_sr14.0-0.11.1

   - SUSE Linux Enterprise Java 11 SP3 (i586 ppc64 s390x x86_64):

      java-1_6_0-ibm-1.6.0_sr14.0-0.3.1
      java-1_6_0-ibm-devel-1.6.0_sr14.0-0.3.1
      java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.3.1
      java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.3.1

   - SUSE Linux Enterprise Java 11 SP3 (i586 x86_64):

      java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.3.1

   - SUSE Linux Enterprise Java 11 SP3 (i586):

      java-1_6_0-ibm-alsa-1.6.0_sr14.0-0.3.1

   - SUSE Linux Enterprise Java 10 SP4 (x86_64):

      java-1_6_0-ibm-1.6.0_sr14.0-0.11.1
      java-1_6_0-ibm-devel-1.6.0_sr14.0-0.11.1
      java-1_6_0-ibm-fonts-1.6.0_sr14.0-0.11.1
      java-1_6_0-ibm-jdbc-1.6.0_sr14.0-0.11.1
      java-1_6_0-ibm-plugin-1.6.0_sr14.0-0.11.1


References:

   http://support.novell.com/security/cve/CVE-2013-1500.html
   http://support.novell.com/security/cve/CVE-2013-1571.html
   http://support.novell.com/security/cve/CVE-2013-2407.html
   http://support.novell.com/security/cve/CVE-2013-2412.html
   http://support.novell.com/security/cve/CVE-2013-2437.html
   http://support.novell.com/security/cve/CVE-2013-2442.html
   http://support.novell.com/security/cve/CVE-2013-2443.html
   http://support.novell.com/security/cve/CVE-2013-2444.html
   http://support.novell.com/security/cve/CVE-2013-2446.html
   http://support.novell.com/security/cve/CVE-2013-2447.html
   http://support.novell.com/security/cve/CVE-2013-2448.html
   http://support.novell.com/security/cve/CVE-2013-2450.html
   http://support.novell.com/security/cve/CVE-2013-2451.html
   http://support.novell.com/security/cve/CVE-2013-2452.html
   http://support.novell.com/security/cve/CVE-2013-2453.html
   http://support.novell.com/security/cve/CVE-2013-2454.html
   http://support.novell.com/security/cve/CVE-2013-2455.html
   http://support.novell.com/security/cve/CVE-2013-2456.html
   http://support.novell.com/security/cve/CVE-2013-2457.html
   http://support.novell.com/security/cve/CVE-2013-2459.html
   http://support.novell.com/security/cve/CVE-2013-2463.html
   http://support.novell.com/security/cve/CVE-2013-2464.html
   http://support.novell.com/security/cve/CVE-2013-2465.html
   http://support.novell.com/security/cve/CVE-2013-2466.html
   http://support.novell.com/security/cve/CVE-2013-2468.html
   http://support.novell.com/security/cve/CVE-2013-2469.html
   http://support.novell.com/security/cve/CVE-2013-2470.html
   http://support.novell.com/security/cve/CVE-2013-2471.html
   http://support.novell.com/security/cve/CVE-2013-2472.html
   http://support.novell.com/security/cve/CVE-2013-2473.html
   http://support.novell.com/security/cve/CVE-2013-3009.html
   http://support.novell.com/security/cve/CVE-2013-3011.html
   http://support.novell.com/security/cve/CVE-2013-3012.html
   http://support.novell.com/security/cve/CVE-2013-3743.html
   http://support.novell.com/security/cve/CVE-2013-4002.html
   https://bugzilla.novell.com/817062
   https://bugzilla.novell.com/823034
   https://bugzilla.novell.com/829212
  
http://download.novell.com/patch/finder/?keywords=2506266f7074154371238b0be5bf61f3
   http://download.novell.com/patch/finder/?keywords=d4115b4339a15f88677fc83a534c4dc3




Spotlight

Behavioral analysis and information security

Posted on 22 September 2014.  |  In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security and how behavioral analysis can influence the evolution of security technologies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //