<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for java-1_7_0-openjdk</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:0774-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-04-22T12:02:46Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-04-22T12:02:46Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-04-22T12:02:46Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for java-1_7_0-openjdk</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">OpenJDK was updated to 2.5.5 - OpenJdk 7u79 to fix security issues and bugs:

The following vulnerabilities were fixed:

* CVE-2015-0458: Deployment: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
* CVE-2015-0459: 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
* CVE-2015-0460: Hotspot: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
* CVE-2015-0469: 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
* CVE-2015-0477: Beans: unauthenticated remote attackers could update, insert or delete some JAVA accessible data via multiple protocols
* CVE-2015-0478: JCE: unauthenticated remote attackers could read some JAVA accessible data via multiple protocols
* CVE-2015-0480: Tools: unauthenticated remote attackers could update, insert or delete some JAVA accessible data via multiple protocols and cause a partial denial of service (partial DOS)
* CVE-2015-0484: JavaFX: unauthenticated remote attackers could read, update, insert or delete access some Java accessible data via multiple protocols and cause a partial denial of service (partial DOS).
* CVE-2015-0488: JSSE: unauthenticated remote attackers could cause a partial denial of service (partial DOS).
* CVE-2015-0491: 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols.
* CVE-2015-0492: JavaFX: unauthenticated remote attackers could execute arbitrary code via multiple protocols.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:0774-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-1.7.0.79-7.4">
      <FullProductName ProductID="java-1_7_0-openjdk-1.7.0.79-7.4">java-1_7_0-openjdk-1.7.0.79-7.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4">
      <FullProductName ProductID="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4">java-1_7_0-openjdk-accessibility-1.7.0.79-7.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4">
      <FullProductName ProductID="java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4">java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-debugsource-1.7.0.79-7.4">
      <FullProductName ProductID="java-1_7_0-openjdk-debugsource-1.7.0.79-7.4">java-1_7_0-openjdk-debugsource-1.7.0.79-7.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-demo-1.7.0.79-7.4">
      <FullProductName ProductID="java-1_7_0-openjdk-demo-1.7.0.79-7.4">java-1_7_0-openjdk-demo-1.7.0.79-7.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4">
      <FullProductName ProductID="java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4">java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-devel-1.7.0.79-7.4">
      <FullProductName ProductID="java-1_7_0-openjdk-devel-1.7.0.79-7.4">java-1_7_0-openjdk-devel-1.7.0.79-7.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4">
      <FullProductName ProductID="java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4">java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-headless-1.7.0.79-7.4">
      <FullProductName ProductID="java-1_7_0-openjdk-headless-1.7.0.79-7.4">java-1_7_0-openjdk-headless-1.7.0.79-7.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4">
      <FullProductName ProductID="java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4">java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4">
      <FullProductName ProductID="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4">java-1_7_0-openjdk-javadoc-1.7.0.79-7.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-src-1.7.0.79-7.4">
      <FullProductName ProductID="java-1_7_0-openjdk-src-1.7.0.79-7.4">java-1_7_0-openjdk-src-1.7.0.79-7.4</FullProductName>
    </Branch>
    <Relationship ProductReference="java-1_7_0-openjdk-1.7.0.79-7.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:java-1_7_0-openjdk-1.7.0.79-7.4">java-1_7_0-openjdk-1.7.0.79-7.4 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:java-1_7_0-openjdk-accessibility-1.7.0.79-7.4">java-1_7_0-openjdk-accessibility-1.7.0.79-7.4 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4">java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-debugsource-1.7.0.79-7.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:java-1_7_0-openjdk-debugsource-1.7.0.79-7.4">java-1_7_0-openjdk-debugsource-1.7.0.79-7.4 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-demo-1.7.0.79-7.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:java-1_7_0-openjdk-demo-1.7.0.79-7.4">java-1_7_0-openjdk-demo-1.7.0.79-7.4 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4">java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-devel-1.7.0.79-7.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:java-1_7_0-openjdk-devel-1.7.0.79-7.4">java-1_7_0-openjdk-devel-1.7.0.79-7.4 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4">java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-headless-1.7.0.79-7.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:java-1_7_0-openjdk-headless-1.7.0.79-7.4">java-1_7_0-openjdk-headless-1.7.0.79-7.4 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4">java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:java-1_7_0-openjdk-javadoc-1.7.0.79-7.4">java-1_7_0-openjdk-javadoc-1.7.0.79-7.4 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-src-1.7.0.79-7.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:java-1_7_0-openjdk-src-1.7.0.79-7.4">java-1_7_0-openjdk-src-1.7.0.79-7.4 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in in Oracle Java SE 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.</Note>
    </Notes>
    <CVE>CVE-2015-0458</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-accessibility-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debugsource-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-javadoc-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-src-1.7.0.79-7.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0458.html</URL>
        <Description>CVE-2015-0458</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927591</URL>
        <Description>SUSE Bug 927591</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0491.</Note>
    </Notes>
    <CVE>CVE-2015-0459</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-accessibility-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debugsource-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-javadoc-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-src-1.7.0.79-7.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0459.html</URL>
        <Description>CVE-2015-0459</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927591</URL>
        <Description>SUSE Bug 927591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932310</URL>
        <Description>SUSE Bug 932310</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.</Note>
    </Notes>
    <CVE>CVE-2015-0460</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-accessibility-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debugsource-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-javadoc-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-src-1.7.0.79-7.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0460.html</URL>
        <Description>CVE-2015-0460</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927591</URL>
        <Description>SUSE Bug 927591</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.</Note>
    </Notes>
    <CVE>CVE-2015-0469</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-accessibility-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debugsource-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-javadoc-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-src-1.7.0.79-7.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0469.html</URL>
        <Description>CVE-2015-0469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927591</URL>
        <Description>SUSE Bug 927591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932310</URL>
        <Description>SUSE Bug 932310</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity via unknown vectors related to Beans.</Note>
    </Notes>
    <CVE>CVE-2015-0477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-accessibility-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debugsource-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-javadoc-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-src-1.7.0.79-7.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0477.html</URL>
        <Description>CVE-2015-0477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927591</URL>
        <Description>SUSE Bug 927591</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect confidentiality via vectors related to JCE.</Note>
    </Notes>
    <CVE>CVE-2015-0478</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-accessibility-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debugsource-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-javadoc-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-src-1.7.0.79-7.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0478.html</URL>
        <Description>CVE-2015-0478</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927591</URL>
        <Description>SUSE Bug 927591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944456</URL>
        <Description>SUSE Bug 944456</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.</Note>
    </Notes>
    <CVE>CVE-2015-0480</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-accessibility-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debugsource-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-javadoc-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-src-1.7.0.79-7.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0480.html</URL>
        <Description>CVE-2015-0480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927591</URL>
        <Description>SUSE Bug 927591</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 7u76 and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-0492.</Note>
    </Notes>
    <CVE>CVE-2015-0484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-accessibility-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debugsource-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-javadoc-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-src-1.7.0.79-7.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0484.html</URL>
        <Description>CVE-2015-0484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927591</URL>
        <Description>SUSE Bug 927591</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect availability via vectors related to JSSE.</Note>
    </Notes>
    <CVE>CVE-2015-0488</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-accessibility-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debugsource-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-javadoc-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-src-1.7.0.79-7.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0488.html</URL>
        <Description>CVE-2015-0488</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927591</URL>
        <Description>SUSE Bug 927591</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0459.</Note>
    </Notes>
    <CVE>CVE-2015-0491</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-accessibility-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debugsource-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-javadoc-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-src-1.7.0.79-7.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0491.html</URL>
        <Description>CVE-2015-0491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927591</URL>
        <Description>SUSE Bug 927591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932310</URL>
        <Description>SUSE Bug 932310</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 7u76 and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-0484.</Note>
    </Notes>
    <CVE>CVE-2015-0492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-accessibility-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-debugsource-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-javadoc-1.7.0.79-7.4</ProductID>
        <ProductID>openSUSE 13.2:java-1_7_0-openjdk-src-1.7.0.79-7.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0492.html</URL>
        <Description>CVE-2015-0492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927591</URL>
        <Description>SUSE Bug 927591</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
