<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for java-1_7_0-openjdk</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1235-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-05-04T15:59:56Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-05-04T15:59:56Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-05-04T15:59:56Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for java-1_7_0-openjdk</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for java-1_7_0-openjdk to version 2.6.6 fixes five security issues.

These security issues were fixed:
- CVE-2016-0686: Ensure thread consistency (bsc#976340).
- CVE-2016-0687: Better byte behavior (bsc#976340).
- CVE-2016-0695: Make DSA more fair (bsc#976340).
- CVE-2016-3425: Better buffering of XML strings (bsc#976340).
- CVE-2016-3427: Improve JMX connections (bsc#976340).</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1235-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-1.7.0.101-24.36.2">
      <FullProductName ProductID="java-1_7_0-openjdk-1.7.0.101-24.36.2">java-1_7_0-openjdk-1.7.0.101-24.36.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-accessibility-1.7.0.101-24.36.2">
      <FullProductName ProductID="java-1_7_0-openjdk-accessibility-1.7.0.101-24.36.2">java-1_7_0-openjdk-accessibility-1.7.0.101-24.36.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-demo-1.7.0.101-24.36.2">
      <FullProductName ProductID="java-1_7_0-openjdk-demo-1.7.0.101-24.36.2">java-1_7_0-openjdk-demo-1.7.0.101-24.36.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-devel-1.7.0.101-24.36.2">
      <FullProductName ProductID="java-1_7_0-openjdk-devel-1.7.0.101-24.36.2">java-1_7_0-openjdk-devel-1.7.0.101-24.36.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-headless-1.7.0.101-24.36.2">
      <FullProductName ProductID="java-1_7_0-openjdk-headless-1.7.0.101-24.36.2">java-1_7_0-openjdk-headless-1.7.0.101-24.36.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-javadoc-1.7.0.101-24.36.2">
      <FullProductName ProductID="java-1_7_0-openjdk-javadoc-1.7.0.101-24.36.2">java-1_7_0-openjdk-javadoc-1.7.0.101-24.36.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-src-1.7.0.101-24.36.2">
      <FullProductName ProductID="java-1_7_0-openjdk-src-1.7.0.101-24.36.2">java-1_7_0-openjdk-src-1.7.0.101-24.36.2</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Serialization.</Note>
    </Notes>
    <CVE>CVE-2016-0686</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0686.html</URL>
        <Description>CVE-2016-0686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976340</URL>
        <Description>SUSE Bug 976340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979252</URL>
        <Description>SUSE Bug 979252</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the Hotspot sub-component.</Note>
    </Notes>
    <CVE>CVE-2016-0687</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0687.html</URL>
        <Description>CVE-2016-0687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976340</URL>
        <Description>SUSE Bug 976340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979252</URL>
        <Description>SUSE Bug 979252</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality via vectors related to Security.</Note>
    </Notes>
    <CVE>CVE-2016-0695</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0695.html</URL>
        <Description>CVE-2016-0695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976340</URL>
        <Description>SUSE Bug 976340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979252</URL>
        <Description>SUSE Bug 979252</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect availability via vectors related to JAXP.</Note>
    </Notes>
    <CVE>CVE-2016-3425</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3425.html</URL>
        <Description>CVE-2016-3425</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976340</URL>
        <Description>SUSE Bug 976340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979252</URL>
        <Description>SUSE Bug 979252</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.</Note>
    </Notes>
    <CVE>CVE-2016-3427</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3427.html</URL>
        <Description>CVE-2016-3427</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011805</URL>
        <Description>SUSE Bug 1011805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976340</URL>
        <Description>SUSE Bug 976340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979252</URL>
        <Description>SUSE Bug 979252</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
