SUSE Security Update: Security update for java-1_7_0-ibm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1257-1
Rating:             important
References:         #817062 #823034 #829212 
Cross-References:   CVE-2013-1500 CVE-2013-1571 CVE-2013-2400
                    CVE-2013-2407 CVE-2013-2412 CVE-2013-2437
                    CVE-2013-2442 CVE-2013-2443 CVE-2013-2444
                    CVE-2013-2446 CVE-2013-2447 CVE-2013-2448
                    CVE-2013-2449 CVE-2013-2450 CVE-2013-2451
                    CVE-2013-2452 CVE-2013-2453 CVE-2013-2454
                    CVE-2013-2455 CVE-2013-2456 CVE-2013-2457
                    CVE-2013-2458 CVE-2013-2459 CVE-2013-2460
                    CVE-2013-2462 CVE-2013-2463 CVE-2013-2464
                    CVE-2013-2465 CVE-2013-2466 CVE-2013-2468
                    CVE-2013-2469 CVE-2013-2470 CVE-2013-2471
                    CVE-2013-2472 CVE-2013-2473 CVE-2013-3006
                    CVE-2013-3007 CVE-2013-3008 CVE-2013-3009
                    CVE-2013-3010 CVE-2013-3011 CVE-2013-3012
                    CVE-2013-3743 CVE-2013-3744 CVE-2013-4002
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP2
                    SUSE Linux Enterprise Server 11 SP2 for VMware
                    SUSE Linux Enterprise Server 11 SP2
                    SUSE Linux Enterprise Java 11 SP2
______________________________________________________________________________

   An update that fixes 45 vulnerabilities is now available.

Description:


   IBM Java 1.7.0 has been updated to SR5 to fix bugs and
   security issues.

   Please see also
   https://www.ibm.com/support/pages/java-sdk/
   

   Also the following bugs have been fixed:

   * add Europe/Busingen to tzmappings (bnc#817062)
   * mark files in jre/bin and bin/ as executable
   (bnc#823034)

   Security Issue references:

   * CVE-2013-3006
   
   * CVE-2013-3007
   
   * CVE-2013-3008
   
   * CVE-2013-3009
   
   * CVE-2013-3010
   
   * CVE-2013-3011
   
   * CVE-2013-3012
   
   * CVE-2013-4002
   
   * CVE-2013-2468
   
   * CVE-2013-2469
   
   * CVE-2013-2465
   
   * CVE-2013-2464
   
   * CVE-2013-2463
   
   * CVE-2013-2473
   
   * CVE-2013-2472
   
   * CVE-2013-2471
   
   * CVE-2013-2470
   
   * CVE-2013-2459
   
   * CVE-2013-2466
   
   * CVE-2013-2462
   
   * CVE-2013-2460
   
   * CVE-2013-3743
   
   * CVE-2013-2448
   
   * CVE-2013-2442
   
   * CVE-2013-2407
   
   * CVE-2013-2454
   
   * CVE-2013-2458
   
   * CVE-2013-3744
   
   * CVE-2013-2400
   
   * CVE-2013-2456
   
   * CVE-2013-2453
   
   * CVE-2013-2457
   
   * CVE-2013-2455
   
   * CVE-2013-2412
   
   * CVE-2013-2443
   
   * CVE-2013-2447
   
   * CVE-2013-2437
   
   * CVE-2013-2444
   
   * CVE-2013-2452
   
   * CVE-2013-2446
   
   * CVE-2013-2450
   
   * CVE-2013-1571
   
   * CVE-2013-2449
   
   * CVE-2013-2451
   
   * CVE-2013-1500
   


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP2:

      zypper in -t patch sdksp2-java-1_7_0-ibm-8108

   - SUSE Linux Enterprise Server 11 SP2 for VMware:

      zypper in -t patch slessp2-java-1_7_0-ibm-8108

   - SUSE Linux Enterprise Server 11 SP2:

      zypper in -t patch slessp2-java-1_7_0-ibm-8108

   - SUSE Linux Enterprise Java 11 SP2:

      zypper in -t patch slejsp2-java-1_7_0-ibm-8108

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 s390x x86_64):

      java-1_7_0-ibm-devel-1.7.0_sr5.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

      java-1_7_0-ibm-1.7.0_sr5.0-0.5.1
      java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5.1
      java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5.1
      java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 ppc64 s390x x86_64):

      java-1_7_0-ibm-1.7.0_sr5.0-0.5.1
      java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64):

      java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5.1
      java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5.1

   - SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64):

      java-1_7_0-ibm-1.7.0_sr5.0-0.5.1
      java-1_7_0-ibm-devel-1.7.0_sr5.0-0.5.1
      java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5.1

   - SUSE Linux Enterprise Java 11 SP2 (i586 x86_64):

      java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5.1
      java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5.1


References:

   https://www.suse.com/security/cve/CVE-2013-1500.html
   https://www.suse.com/security/cve/CVE-2013-1571.html
   https://www.suse.com/security/cve/CVE-2013-2400.html
   https://www.suse.com/security/cve/CVE-2013-2407.html
   https://www.suse.com/security/cve/CVE-2013-2412.html
   https://www.suse.com/security/cve/CVE-2013-2437.html
   https://www.suse.com/security/cve/CVE-2013-2442.html
   https://www.suse.com/security/cve/CVE-2013-2443.html
   https://www.suse.com/security/cve/CVE-2013-2444.html
   https://www.suse.com/security/cve/CVE-2013-2446.html
   https://www.suse.com/security/cve/CVE-2013-2447.html
   https://www.suse.com/security/cve/CVE-2013-2448.html
   https://www.suse.com/security/cve/CVE-2013-2449.html
   https://www.suse.com/security/cve/CVE-2013-2450.html
   https://www.suse.com/security/cve/CVE-2013-2451.html
   https://www.suse.com/security/cve/CVE-2013-2452.html
   https://www.suse.com/security/cve/CVE-2013-2453.html
   https://www.suse.com/security/cve/CVE-2013-2454.html
   https://www.suse.com/security/cve/CVE-2013-2455.html
   https://www.suse.com/security/cve/CVE-2013-2456.html
   https://www.suse.com/security/cve/CVE-2013-2457.html
   https://www.suse.com/security/cve/CVE-2013-2458.html
   https://www.suse.com/security/cve/CVE-2013-2459.html
   https://www.suse.com/security/cve/CVE-2013-2460.html
   https://www.suse.com/security/cve/CVE-2013-2462.html
   https://www.suse.com/security/cve/CVE-2013-2463.html
   https://www.suse.com/security/cve/CVE-2013-2464.html
   https://www.suse.com/security/cve/CVE-2013-2465.html
   https://www.suse.com/security/cve/CVE-2013-2466.html
   https://www.suse.com/security/cve/CVE-2013-2468.html
   https://www.suse.com/security/cve/CVE-2013-2469.html
   https://www.suse.com/security/cve/CVE-2013-2470.html
   https://www.suse.com/security/cve/CVE-2013-2471.html
   https://www.suse.com/security/cve/CVE-2013-2472.html
   https://www.suse.com/security/cve/CVE-2013-2473.html
   https://www.suse.com/security/cve/CVE-2013-3006.html
   https://www.suse.com/security/cve/CVE-2013-3007.html
   https://www.suse.com/security/cve/CVE-2013-3008.html
   https://www.suse.com/security/cve/CVE-2013-3009.html
   https://www.suse.com/security/cve/CVE-2013-3010.html
   https://www.suse.com/security/cve/CVE-2013-3011.html
   https://www.suse.com/security/cve/CVE-2013-3012.html
   https://www.suse.com/security/cve/CVE-2013-3743.html
   https://www.suse.com/security/cve/CVE-2013-3744.html
   https://www.suse.com/security/cve/CVE-2013-4002.html
   https://bugzilla.novell.com/817062
   https://bugzilla.novell.com/823034
   https://bugzilla.novell.com/829212
   https://login.microfocus.com/nidp/app/login

SuSE: 2013:1257-1: important: java-1_7_0-ibm

July 25, 2013
An update that fixes 45 vulnerabilities is now available

Summary

IBM Java 1.7.0 has been updated to SR5 to fix bugs and security issues. Please see also https://www.ibm.com/support/pages/java-sdk/ Also the following bugs have been fixed: * add Europe/Busingen to tzmappings (bnc#817062) * mark files in jre/bin and bin/ as executable (bnc#823034) Security Issue references: * CVE-2013-3006 * CVE-2013-3007 * CVE-2013-3008 * CVE-2013-3009 * CVE-2013-3010 * CVE-2013-3011 * CVE-2013-3012 * CVE-2013-4002 * CVE-2013-2468 * CVE-2013-2469 * CVE-2013-2465 * CVE-2013-2464 * CVE-2013-2463 * CVE-2013-2473 * CVE-2013-2472 * CVE-2013-2471 * CVE-2013-2470 * CVE-2013-2459 * CVE-2013-2466 * CVE-2013-2462 * CVE-2013-2460 * CVE-2013-3743 * CVE-2013-2448 * CVE-2013-2442 * CVE-2013-2407 * CVE-2013-2454 * CVE-2013-2458 * CVE-2013-3744 * CVE-2013-2400 * CVE-2013-2456 * CVE-2013-2453 * CVE-2013-2457 * CVE-2013-2455 * CVE-2013-2412 * CVE-2013-2443 * CVE-2013-2447 * CVE-2013-2437 * CVE-2013-2444 * CVE-2013-2452 * CVE-2013-2446 * CVE-2013-2450 * CVE-2013-1571 * CVE-2013-2449 * CVE-2013-2451 * CVE-2013-1500 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-java-1_7_0-ibm-8108 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-java-1_7_0-ibm-8108 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-java-1_7_0-ibm-8108 - SUSE Linux Enterprise Java 11 SP2: zypper in -t patch slejsp2-java-1_7_0-ibm-8108 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 s390x x86_64): java-1_7_0-ibm-devel-1.7.0_sr5.0-0.5.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): java-1_7_0-ibm-1.7.0_sr5.0-0.5.1 java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5.1 java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5.1 java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ppc64 s390x x86_64): java-1_7_0-ibm-1.7.0_sr5.0-0.5.1 java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5.1 - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64): java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5.1 java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5.1 - SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64): java-1_7_0-ibm-1.7.0_sr5.0-0.5.1 java-1_7_0-ibm-devel-1.7.0_sr5.0-0.5.1 java-1_7_0-ibm-jdbc-1.7.0_sr5.0-0.5.1 - SUSE Linux Enterprise Java 11 SP2 (i586 x86_64): java-1_7_0-ibm-alsa-1.7.0_sr5.0-0.5.1 java-1_7_0-ibm-plugin-1.7.0_sr5.0-0.5.1

References

#817062 #823034 #829212

Cross- CVE-2013-1500 CVE-2013-1571 CVE-2013-2400

CVE-2013-2407 CVE-2013-2412 CVE-2013-2437

CVE-2013-2442 CVE-2013-2443 CVE-2013-2444

CVE-2013-2446 CVE-2013-2447 CVE-2013-2448

CVE-2013-2449 CVE-2013-2450 CVE-2013-2451

CVE-2013-2452 CVE-2013-2453 CVE-2013-2454

CVE-2013-2455 CVE-2013-2456 CVE-2013-2457

CVE-2013-2458 CVE-2013-2459 CVE-2013-2460

CVE-2013-2462 CVE-2013-2463 CVE-2013-2464

CVE-2013-2465 CVE-2013-2466 CVE-2013-2468

CVE-2013-2469 CVE-2013-2470 CVE-2013-2471

CVE-2013-2472 CVE-2013-2473 CVE-2013-3006

CVE-2013-3007 CVE-2013-3008 CVE-2013-3009

CVE-2013-3010 CVE-2013-3011 CVE-2013-3012

CVE-2013-3743 CVE-2013-3744 CVE-2013-4002

Affected Products:

SUSE Linux Enterprise Software Development Kit 11 SP2

SUSE Linux Enterprise Server 11 SP2 for VMware

SUSE Linux Enterprise Server 11 SP2

SUSE Linux Enterprise Java 11 SP2

https://www.suse.com/security/cve/CVE-2013-1500.html

https://www.suse.com/security/cve/CVE-2013-1571.html

https://www.suse.com/security/cve/CVE-2013-2400.html

https://www.suse.com/security/cve/CVE-2013-2407.html

https://www.suse.com/security/cve/CVE-2013-2412.html

https://www.suse.com/security/cve/CVE-2013-2437.html

https://www.suse.com/security/cve/CVE-2013-2442.html

https://www.suse.com/security/cve/CVE-2013-2443.html

https://www.suse.com/security/cve/CVE-2013-2444.html

https://www.suse.com/security/cve/CVE-2013-2446.html

https://www.suse.com/security/cve/CVE-2013-2447.html

https://www.suse.com/security/cve/CVE-2013-2448.html

https://www.suse.com/security/cve/CVE-2013-2449.html

https://www.suse.com/security/cve/CVE-2013-2450.html

https://www.suse.com/security/cve/CVE-2013-2451.html

https://www.suse.com/security/cve/CVE-2013-2452.html

https://www.suse.com/security/cve/CVE-2013-2453.html

https://www.suse.com/security/cve/CVE-2013-2454.html

https://www.suse.com/security/cve/CVE-2013-2455.html

https://www.suse.com/security/cve/CVE-2013-2456.html

https://www.suse.com/security/cve/CVE-2013-2457.html

https://www.suse.com/security/cve/CVE-2013-2458.html

https://www.suse.com/security/cve/CVE-2013-2459.html

https://www.suse.com/security/cve/CVE-2013-2460.html

https://www.suse.com/security/cve/CVE-2013-2462.html

https://www.suse.com/security/cve/CVE-2013-2463.html

https://www.suse.com/security/cve/CVE-2013-2464.html

https://www.suse.com/security/cve/CVE-2013-2465.html

https://www.suse.com/security/cve/CVE-2013-2466.html

https://www.suse.com/security/cve/CVE-2013-2468.html

https://www.suse.com/security/cve/CVE-2013-2469.html

https://www.suse.com/security/cve/CVE-2013-2470.html

https://www.suse.com/security/cve/CVE-2013-2471.html

https://www.suse.com/security/cve/CVE-2013-2472.html

https://www.suse.com/security/cve/CVE-2013-2473.html

https://www.suse.com/security/cve/CVE-2013-3006.html

https://www.suse.com/security/cve/CVE-2013-3007.html

https://www.suse.com/security/cve/CVE-2013-3008.html

https://www.suse.com/security/cve/CVE-2013-3009.html

https://www.suse.com/security/cve/CVE-2013-3010.html

https://www.suse.com/security/cve/CVE-2013-3011.html

https://www.suse.com/security/cve/CVE-2013-3012.html

https://www.suse.com/security/cve/CVE-2013-3743.html

https://www.suse.com/security/cve/CVE-2013-3744.html

https://www.suse.com/security/cve/CVE-2013-4002.html

https://bugzilla.novell.com/817062

https://bugzilla.novell.com/823034

https://bugzilla.novell.com/829212

https://login.microfocus.com/nidp/app/login

Severity
Announcement ID: SUSE-SU-2013:1257-1
Rating: important

Related News