SuSE: 2015:2168-2: important: java-1_7_1-ibm
Summary
The java-1_7_1-ibm package was updated to versioin 7.1-3.20 to fix several security and non security issues: - bnc#955131: Version update to 7.1-3.20: CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810 CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844 CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883 CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006 - Add backcompat symlinks for sdkdir - bnc#941939: Fix to provide %{name} instead of %{sdklnk} only in _jvmprivdir Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2015-920=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2015-920=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): java-1_7_1-ibm-devel-1.7.1_sr3.20-18.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): java-1_7_1-ibm-1.7.1_sr3.20-18.1 java-1_7_1-ibm-jdbc-1.7.1_sr3.20-18.1 - SUSE Linux Enterprise Server 12-SP1 (x86_64): java-1_7_1-ibm-alsa-1.7.1_sr3.20-18.1 java-1_7_1-ibm-plugin-1.7.1_sr3.20-18.1
References
#941939 #955131
Cross- CVE-2015-0204 CVE-2015-0458 CVE-2015-0459
CVE-2015-0469 CVE-2015-0477 CVE-2015-0478
CVE-2015-0480 CVE-2015-0488 CVE-2015-0491
CVE-2015-4734 CVE-2015-4803 CVE-2015-4805
CVE-2015-4806 CVE-2015-4810 CVE-2015-4835
CVE-2015-4840 CVE-2015-4842 CVE-2015-4843
CVE-2015-4844 CVE-2015-4860 CVE-2015-4871
CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
CVE-2015-4893 CVE-2015-4902 CVE-2015-4903
CVE-2015-4911 CVE-2015-5006
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server 12-SP1
https://www.suse.com/security/cve/CVE-2015-0204.html
https://www.suse.com/security/cve/CVE-2015-0458.html
https://www.suse.com/security/cve/CVE-2015-0459.html
https://www.suse.com/security/cve/CVE-2015-0469.html
https://www.suse.com/security/cve/CVE-2015-0477.html
https://www.suse.com/security/cve/CVE-2015-0478.html
https://www.suse.com/security/cve/CVE-2015-0480.html
https://www.suse.com/security/cve/CVE-2015-0488.html
https://www.suse.com/security/cve/CVE-2015-0491.html
https://www.suse.com/security/cve/CVE-2015-4734.html
https://www.suse.com/security/cve/CVE-2015-4803.html
https://www.suse.com/security/cve/CVE-2015-4805.html
https://www.suse.com/security/cve/CVE-2015-4806.html
https://www.suse.com/security/cve/CVE-2015-4810.html
https://www.suse.com/security/cve/CVE-2015-4835.html
https://www.suse.com/security/cve/CVE-2015-4840.html
https://www.suse.com/security/cve/CVE-2015-4842.html
https://www.suse.com/security/cve/CVE-2015-4843.html
https://www.suse.com/security/cve/CVE-2015-4844.html
https://www.suse.com/security/cve/CVE-2015-4860.html
https://www.suse.com/security/cve/CVE-2015-4871.html
https://www.suse.com/security/cve/CVE-2015-4872.html
https://www.suse.com/security/cve/CVE-2015-4882.html
https://www.suse.com/security/cve/CVE-2015-4883.html
https://www.suse.com/security/cve/CVE-2015-4893.html
https://www.suse.com/security/cve/CVE-2015-4902.html
https://www.suse.com/security/cve/CVE-2015-4903.html
https://www.suse.com/security/cve/CVE-2015-4911.html
https://www.suse.com/security/cve/CVE-2015-5006.html
https://bugzilla.suse.com/941939
https://bugzilla.suse.com/955131