[SUSE-SU-2015:1086-3] Security update for IBM Java 7
Severity
Moderate
Affected Packages
15
CVEs
263
Security update for IBM Java 7
IBM Java 7 SR6 has been released and fixes lots of bugs and security
issues.
More information can be found on:
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.ibm.com/developerworks/java/jdk/alerts/
Security Issue references:
* CVE-2013-5458
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458>
* CVE-2013-5456
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456>
* CVE-2013-5457
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457>
* CVE-2013-4041
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041>
* CVE-2013-5375
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375>
* CVE-2013-5372
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372>
* CVE-2013-5843
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843>
* CVE-2013-5789
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789>
* CVE-2013-5830
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830>
* CVE-2013-5829
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829>
* CVE-2013-5787
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787>
* CVE-2013-5788
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788>
* CVE-2013-5824
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824>
* CVE-2013-5842
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842>
* CVE-2013-5782
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782>
* CVE-2013-5817
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817>
* CVE-2013-5809
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809>
* CVE-2013-5814
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814>
* CVE-2013-5832
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832>
* CVE-2013-5850
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850>
* CVE-2013-5838
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838>
* CVE-2013-5802
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802>
* CVE-2013-5812
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812>
* CVE-2013-5804
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804>
* CVE-2013-5783
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783>
* CVE-2013-3829
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829>
* CVE-2013-5823
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823>
* CVE-2013-5831
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831>
* CVE-2013-5820
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820>
* CVE-2013-5819
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819>
* CVE-2013-5818
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818>
* CVE-2013-5848
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848>
* CVE-2013-5776
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776>
* CVE-2013-5774
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774>
* CVE-2013-5825
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825>
* CVE-2013-5840
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840>
* CVE-2013-5801
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801>
* CVE-2013-5778
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778>
* CVE-2013-5851
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851>
* CVE-2013-5800
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800>
* CVE-2013-5784
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784>
* CVE-2013-5849
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849>
* CVE-2013-5790
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790>
* CVE-2013-5780
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780>
* CVE-2013-5797
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797>
* CVE-2013-5803
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803>
* CVE-2013-5772
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772>
- ID
- SUSE-SU-2015:1086-3
- Severity
- moderate
- URL
- https://www.suse.com/support/update/announcement/2015/suse-su-20151086-3/
- Published
-
2013-11-19T10:42:44
(10 years ago) - Modified
-
2013-11-19T10:42:44
(10 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2012-119
- ALAS-2012-136
- ALAS-2012-137
- ALAS-2012-88
- ALAS-2013-151
- ALAS-2013-155
- ALAS-2013-156
- ALAS-2013-162
- ALAS-2013-163
- ALAS-2013-167
- ALAS-2013-168
- ALAS-2013-171
- ALAS-2013-183
- ALAS-2013-185
- ALAS-2013-204
- ALAS-2013-207
- ALAS-2013-235
- ALAS-2013-246
- ALAS-2013-267
- ALAS-2014-280
- ALAS-2014-283
- ALAS-2014-320
- ALAS-2014-326
- ALAS-2014-327
- ALAS-2014-436
- ALAS-2015-469
- ALAS-2015-515
- ALAS-2015-516
- ALAS-2015-517
- ALAS-2015-570
- ALAS-2015-571
- ALAS-2015-586
- CISA-2022:0303
- CISA-2022:0328
- CISA-2022:0525
- CISCO-SA-20150113-CVE-2015-0204
- CISCO-SA-20150310-SSL
- DSA-2722-1
- DSA-2727-1
- DSA-2799-1
- DSA-2912-1
- DSA-2923-1
- DSA-3125-1
- DSA-3187-1
- DSA-3234-1
- DSA-3235-1
- DSA-3316-1
- DSA-3339-1
- ELSA-2012-0729
- ELSA-2012-0730
- ELSA-2012-1009
- ELSA-2012-1221
- ELSA-2012-1222
- ELSA-2012-1223
- ELSA-2012-1384
- ELSA-2012-1385
- ELSA-2012-1386
- ELSA-2013-0165
- ELSA-2013-0245
- ELSA-2013-0246
- ELSA-2013-0247
- ELSA-2013-0273
- ELSA-2013-0274
- ELSA-2013-0275
- ELSA-2013-0587
- ELSA-2013-0602
- ELSA-2013-0603
- ELSA-2013-0604
- ELSA-2013-0605
- ELSA-2013-0751
- ELSA-2013-0752
- ELSA-2013-0770
- ELSA-2013-0957
- ELSA-2013-0958
- ELSA-2013-1014
- ELSA-2013-1447
- ELSA-2013-1451
- ELSA-2013-1505
- ELSA-2013-1803
- ELSA-2013-1804
- ELSA-2014-0026
- ELSA-2014-0027
- ELSA-2014-0097
- ELSA-2014-0406
- ELSA-2014-0407
- ELSA-2014-0408
- ELSA-2014-0675
- ELSA-2014-0685
- ELSA-2014-1319
- ELSA-2015-0066
- ELSA-2015-0800
- ELSA-2015-0806
- ELSA-2015-0807
- ELSA-2015-0808
- ELSA-2015-0809
- ELSA-2015-1228
- ELSA-2015-1229
- ELSA-2015-1230
- ELSA-2015-1526
- ELSA-2015-3010
- FEDORA-2012-13100
- FEDORA-2012-13131
- FEDORA-2012-13138
- FEDORA-2012-16346
- FEDORA-2012-16351
- FEDORA-2012-9541
- FEDORA-2012-9545
- FEDORA-2012-9590
- FEDORA-2012-9593
- FEDORA-2013-0853
- FEDORA-2013-0868
- FEDORA-2013-0888
- FEDORA-2013-11281
- FEDORA-2013-13479
- FEDORA-2013-13523
- FEDORA-2013-16356
- FEDORA-2013-18251
- FEDORA-2013-1898
- FEDORA-2013-2188
- FEDORA-2013-2197
- FEDORA-2013-2205
- FEDORA-2013-2209
- FEDORA-2013-23722
- FEDORA-2013-23749
- FEDORA-2013-2793
- FEDORA-2013-2813
- FEDORA-2013-2834
- FEDORA-2013-3467
- FEDORA-2013-3468
- FEDORA-2013-4403
- FEDORA-2013-5922
- FEDORA-2013-5958
- FEDORA-2013-6368
- FEDORA-2014-10617
- FEDORA-2014-10626
- FEDORA-2014-10649
- FEDORA-2014-1754
- FEDORA-2014-17561
- FEDORA-2014-1766
- FEDORA-2014-1770
- FEDORA-2014-1778
- FEDORA-2014-1803
- FEDORA-2014-4564
- FEDORA-2014-6631
- FEDORA-2014-6717
- FEDORA-2014-6859
- FEDORA-2014-6870
- FEDORA-2015-0601
- FEDORA-2015-2580
- FEDORA-2015-2830
- FEDORA-2015-4300
- FREEBSD:00B0D8CD-7097-11E2-98D9-003067C2616F
- FREEBSD:16846D1E-F1DE-11E1-8BD8-0022156E8794
- FREEBSD:4E536C14-9791-11E4-977D-D050992ECDE8
- FREEBSD:69BFC852-9BD0-11E2-A7BE-8C705AF55518
- FREEBSD:9D15355B-CE7C-11E4-9DB0-D050992ECDE8
- FREEBSD:D5E0317E-5E45-11E2-A113-C48508086173
- FREEBSD:DD116B19-64B3-11E3-868F-0025905A4771
- GLSA-201310-10
- GLSA-201312-03
- GLSA-201401-30
- GLSA-201406-32
- GLSA-201412-46
- GLSA-201502-12
- GLSA-201503-11
- GLSA-201512-10
- GLSA-201603-11
- GLSA-201606-03
- MAVEN:GHSA-7J4H-8WPF-RQFH
- MAVEN:GHSA-8GWC-X7MG-7P7P
- MS:CVE-2013-6629
- RHSA-2012:0729
- RHSA-2012:0734
- RHSA-2012:1009
- RHSA-2012:1019
- RHSA-2012:1221
- RHSA-2012:1223
- RHSA-2012:1225
- RHSA-2012:1238
- RHSA-2012:1245
- RHSA-2012:1289
- RHSA-2012:1384
- RHSA-2012:1386
- RHSA-2012:1391
- RHSA-2012:1392
- RHSA-2012:1465
- RHSA-2012:1466
- RHSA-2012:1467
- RHSA-2013:0156
- RHSA-2013:0165
- RHSA-2013:0236
- RHSA-2013:0237
- RHSA-2013:0245
- RHSA-2013:0247
- RHSA-2013:0273
- RHSA-2013:0275
- RHSA-2013:0531
- RHSA-2013:0532
- RHSA-2013:0587
- RHSA-2013:0600
- RHSA-2013:0601
- RHSA-2013:0602
- RHSA-2013:0605
- RHSA-2013:0624
- RHSA-2013:0625
- RHSA-2013:0626
- RHSA-2013:0751
- RHSA-2013:0757
- RHSA-2013:0758
- RHSA-2013:0770
- RHSA-2013:0822
- RHSA-2013:0823
- RHSA-2013:0855
- RHSA-2013:0957
- RHSA-2013:0963
- RHSA-2013:1014
- RHSA-2013:1059
- RHSA-2013:1060
- RHSA-2013:1081
- RHSA-2013:1440
- RHSA-2013:1451
- RHSA-2013:1505
- RHSA-2013:1507
- RHSA-2013:1508
- RHSA-2013:1509
- RHSA-2013:1803
- RHSA-2014:0026
- RHSA-2014:0030
- RHSA-2014:0097
- RHSA-2014:0134
- RHSA-2014:0135
- RHSA-2014:0136
- RHSA-2014:0406
- RHSA-2014:0408
- RHSA-2014:0412
- RHSA-2014:0486
- RHSA-2014:0508
- RHSA-2014:0509
- RHSA-2014:0675
- RHSA-2014:0685
- RHSA-2014:0705
- RHSA-2014:1319
- RHSA-2015:0066
- RHSA-2015:0133
- RHSA-2015:0135
- RHSA-2015:0136
- RHSA-2015:0806
- RHSA-2015:0808
- RHSA-2015:0809
- RHSA-2015:1006
- RHSA-2015:1020
- RHSA-2015:1021
- RHSA-2015:1228
- RHSA-2015:1229
- RHSA-2015:1526
- SECADV-20130204-1
- SECADV-20150106-1
- SSA:2013-040-01
- SSA:2013-042-01
- SSA:2013-350-02
- SSA:2015-009-01
- SUSE-SU-2015:0182-2
- SUSE-SU-2015:0304-1
- SUSE-SU-2015:0305-1
- SUSE-SU-2015:0306-1
- SUSE-SU-2015:0336-1
- SUSE-SU-2015:0343-1
- SUSE-SU-2015:0343-2
- SUSE-SU-2015:0344-1
- SUSE-SU-2015:0392-1
- SUSE-SU-2015:0543-1
- SUSE-SU-2015:0545-1
- SUSE-SU-2015:0545-2
- SUSE-SU-2015:0546-1
- SUSE-SU-2015:0547-1
- SUSE-SU-2015:0578-1
- SUSE-SU-2015:0620-1
- SUSE-SU-2015:0789-1
- SUSE-SU-2015:0833-1
- SUSE-SU-2015:0946-1
- SUSE-SU-2015:1073-1
- SUSE-SU-2015:1086-1
- SUSE-SU-2015:1086-2
- SUSE-SU-2015:1086-4
- SUSE-SU-2015:1161-1
- SUSE-SU-2015:1177-1
- SUSE-SU-2015:1182-1
- SUSE-SU-2015:1182-2
- SUSE-SU-2015:1183-1
- SUSE-SU-2015:1183-2
- SUSE-SU-2015:1184-1
- SUSE-SU-2015:1184-2
- SUSE-SU-2015:1185-1
- SUSE-SU-2015:1319-1
- SUSE-SU-2015:1320-1
- SUSE-SU-2015:1329-1
- SUSE-SU-2015:1331-1
- SUSE-SU-2015:1345-1
- SUSE-SU-2015:1375-1
- SUSE-SU-2015:1509-1
- SUSE-SU-2015:2166-1
- SUSE-SU-2015:2168-1
- SUSE-SU-2015:2168-2
- SUSE-SU-2015:2182-1
- SUSE-SU-2015:2192-1
- SUSE-SU-2015:2216-1
- USN-1505-1
- USN-1553-1
- USN-1619-1
- USN-1693-1
- USN-1724-1
- USN-1732-1
- USN-1732-3
- USN-1735-1
- USN-1755-1
- USN-1755-2
- USN-1806-1
- USN-1819-1
- USN-1907-1
- USN-1908-1
- USN-2033-1
- USN-2052-1
- USN-2053-1
- USN-2060-1
- USN-2089-1
- USN-2124-1
- USN-2187-1
- USN-2191-1
- USN-2459-1
- USN-2522-1
- USN-2522-3
- USN-2573-1
- USN-2574-1
- USN-2696-1
- USN-2706-1
- VU:144389
- VU:225657
- VU:625617
- VU:636312
- VU:650142
- VU:688246
- VU:737740
- VU:858729
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/java-1_7_0-ibm?arch=x86_64&distro=sles-11&sp=2 | suse | java-1_7_0-ibm | < 1.7.0_sr6.0-0.7.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/java-1_7_0-ibm?arch=s390x&distro=sles-11&sp=2 | suse | java-1_7_0-ibm | < 1.7.0_sr6.0-0.7.1 | sles-11 | s390x | |
Affected | pkg:rpm/suse/java-1_7_0-ibm?arch=ppc64&distro=sles-11&sp=2 | suse | java-1_7_0-ibm | < 1.7.0_sr6.0-0.7.1 | sles-11 | ppc64 | |
Affected | pkg:rpm/suse/java-1_7_0-ibm?arch=i586&distro=sles-11&sp=2 | suse | java-1_7_0-ibm | < 1.7.0_sr6.0-0.7.1 | sles-11 | i586 | |
Affected | pkg:rpm/suse/java-1_7_0-ibm-plugin?arch=x86_64&distro=sles-11&sp=2 | suse | java-1_7_0-ibm-plugin | < 1.7.0_sr6.0-0.7.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/java-1_7_0-ibm-plugin?arch=i586&distro=sles-11&sp=2 | suse | java-1_7_0-ibm-plugin | < 1.7.0_sr6.0-0.7.1 | sles-11 | i586 | |
Affected | pkg:rpm/suse/java-1_7_0-ibm-jdbc?arch=x86_64&distro=sles-11&sp=2 | suse | java-1_7_0-ibm-jdbc | < 1.7.0_sr6.0-0.7.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/java-1_7_0-ibm-jdbc?arch=s390x&distro=sles-11&sp=2 | suse | java-1_7_0-ibm-jdbc | < 1.7.0_sr6.0-0.7.1 | sles-11 | s390x | |
Affected | pkg:rpm/suse/java-1_7_0-ibm-jdbc?arch=ppc64&distro=sles-11&sp=2 | suse | java-1_7_0-ibm-jdbc | < 1.7.0_sr6.0-0.7.1 | sles-11 | ppc64 | |
Affected | pkg:rpm/suse/java-1_7_0-ibm-jdbc?arch=i586&distro=sles-11&sp=2 | suse | java-1_7_0-ibm-jdbc | < 1.7.0_sr6.0-0.7.1 | sles-11 | i586 | |
Affected | pkg:rpm/suse/java-1_7_0-ibm-devel?arch=x86_64&distro=sles-11&sp=2 | suse | java-1_7_0-ibm-devel | < 1.7.0_sr7.0-0.5.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/java-1_7_0-ibm-devel?arch=s390x&distro=sles-11&sp=2 | suse | java-1_7_0-ibm-devel | < 1.7.0_sr7.0-0.5.1 | sles-11 | s390x | |
Affected | pkg:rpm/suse/java-1_7_0-ibm-devel?arch=i586&distro=sles-11&sp=2 | suse | java-1_7_0-ibm-devel | < 1.7.0_sr7.0-0.5.1 | sles-11 | i586 | |
Affected | pkg:rpm/suse/java-1_7_0-ibm-alsa?arch=x86_64&distro=sles-11&sp=2 | suse | java-1_7_0-ibm-alsa | < 1.7.0_sr6.0-0.7.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/java-1_7_0-ibm-alsa?arch=i586&distro=sles-11&sp=2 | suse | java-1_7_0-ibm-alsa | < 1.7.0_sr6.0-0.7.1 | sles-11 | i586 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |