<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for java-1_7_0-openjdk</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2052-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-08-11T17:13:26Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-08-11T17:13:26Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-08-11T17:13:26Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for java-1_7_0-openjdk</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.7 - OpenJDK 7u111
  * Security fixes
    - S8079718, CVE-2016-3458: IIOP Input Stream Hooking
      (bsc#989732)
    - S8145446, CVE-2016-3485: Perfect pipe placement (Windows
      only)  (bsc#989734)
    - S8147771: Construction of static protection domains under
      Javax custom policy
    - S8148872, CVE-2016-3500: Complete name checking (bsc#989730)
    - S8149962, CVE-2016-3508: Better delineation of XML processing
      (bsc#989731)
    - S8150752: Share Class Data
    - S8151925: Font reference improvements
    - S8152479, CVE-2016-3550: Coded byte streams (bsc#989733)
    - S8155981, CVE-2016-3606: Bolster bytecode verification
      (bsc#989722)
    - S8155985, CVE-2016-3598: Persistent Parameter Processing
      (bsc#989723)
    - S8158571, CVE-2016-3610: Additional method handle validation
      (bsc#989725)
    - CVE-2016-3511 (bsc#989727)
    - CVE-2016-3503 (bsc#989728)
    - CVE-2016-3498 (bsc#989729)
  * Import of OpenJDK 7 u111 build 0
    - S6953295: Move few sun.security.{util, x509, pkcs} classes
      used by keytool/jarsigner to another package
    - S7060849: Eliminate pack200 build warnings
    - S7064075: Security libraries don't build with
      javac -Xlint:all,-deprecation -Werror
    - S7069870: Parts of the JDK erroneously rely on generic array
      initializers with diamond
    - S7102686: Restructure timestamp code so that jars and modules
      can more easily share the same code
    - S7105780: Add SSLSocket client/SSLEngine server to templates
      directory
    - S7142339: PKCS7.java is needlessly creating SHA1PRNG
      SecureRandom instances when timestamping is not done
    - S7152582: PKCS11 tests should use the NSS libraries available
      in the OS
    - S7192202: Make sure keytool prints both unknown and
      unparseable extensions
    - S7194449: String resources for Key Tool and Policy Tool
      should be in their respective packages
    - S7196855: autotest.sh fails on ubuntu because libsoftokn.so
      not found
    - S7200682: TEST_BUG: keytool/autotest.sh still has problems
      with libsoftokn.so
    - S8002306: (se) Selector.open fails if invoked with thread
      interrupt status set [win]
    - S8009636: JARSigner including TimeStamp PolicyID
      (TSAPolicyID) as defined in RFC3161
    - S8019341: Update CookieHttpsClientTest to use the newer
      framework.
    - S8022228: Intermittent test failures in
      sun/security/ssl/javax/net/ssl/NewAPIs
    - S8022439: Fix lint warnings in sun.security.ec
    - S8022594: Potential deadlock in &lt;clinit&gt; of
      sun.nio.ch.Util/IOUtil
    - S8023546: sun/security/mscapi/ShortRSAKey1024.sh fails
      intermittently
    - S8036612: [parfait] JNI exception pending in
      jdk/src/windows/native/sun/security/mscapi/security.cpp
    - S8037557: test SessionCacheSizeTests.java timeout
    - S8038837: Add support to jarsigner for specifying timestamp
      hash algorithm
    - S8079410: Hotspot version to share the same update and build
      version from JDK
    - S8130735: javax.swing.TimerQueue: timer fires late when
      another timer starts
    - S8139436: sun.security.mscapi.KeyStore might load incomplete
      data
    - S8144313: Test SessionTimeOutTests can be timeout
    - S8146387: Test SSLSession/SessionCacheSizeTests socket
      accept timed out
    - S8146669: Test SessionTimeOutTests fails intermittently
    - S8146993: Several javax/management/remote/mandatory regression
      tests fail after JDK-8138811
    - S8147857: [TEST] RMIConnector logs attribute names incorrectly
    - S8151841, PR3098: Build needs additional flags to compile
      with GCC 6
    - S8151876: (tz) Support tzdata2016d
    - S8157077: 8u101 L10n resource file updates
    - S8161262: Fix jdk build with gcc 4.1.2: -fno-strict-overflow
      not known.
  * Import of OpenJDK 7 u111 build 1
    - S7081817: test/sun/security/provider/certpath/X509CertPath/IllegalCertificates.java failing
    - S8140344: add support for 3 digit update release numbers
    - S8145017: Add support for 3 digit hotspot minor version
      numbers
    - S8162344: The API changes made by CR 7064075 need to be
      reverted
  * Backports
    - S2178143, PR2958: JVM crashes if the number of bound CPUs
      changed during runtime
    - S4900206, PR3101: Include worst-case rounding tests for Math
      library functions
    - S6260348, PR3067: GTK+ L&amp;F JTextComponent not respecting
      desktop caret blink rate
    - S6934604, PR3075: enable parts of EliminateAutoBox by default
    - S7043064, PR3020: sun/java2d/cmm/ tests failed against
      RI b141 &amp; b138-nightly
    - S7051394, PR3020: NullPointerException when running
      regression tests LoadProfileTest by using openjdk-7-b144
    - S7086015, PR3013: fix
      test/tools/javac/parser/netbeans/JavacParserTest.java
    - S7119487, PR3013: JavacParserTest.java test fails on Windows
      platforms
    - S7124245, PR3020: [lcms] ColorConvertOp to color space
      CS_GRAY apparently converts orange to 244,244,0
    - S7159445, PR3013: (javac) emits inaccurate diagnostics for
      enhanced for-loops
    - S7175845, PR1437, RH1207129: 'jar uf' changes file
      permissions unexpectedly
    - S8005402, PR3020: Need to provide benchmarks for color
      management
    - S8005530, PR3020: [lcms] Improve performance of ColorConverOp
      for default destinations
    - S8005930, PR3020: [lcms] ColorConvertOp: Alpha channel is not
      transferred from source to destination.
    - S8013430, PR3020: REGRESSION:
      closed/java/awt/color/ICC_Profile/LoadProfileTest/LoadProfileTest.java
      fails with java.io.StreamCorruptedException: invalid type
      code: EE since 8b87
    - S8014286, PR3075: failed java/lang/Math/DivModTests.java
      after 6934604 changes
    - S8014959, PR3075: assert(Compile::current()-&gt;live_nodes() &lt; (uint)MaxNodeLimit)
      failed: Live Node limit exceeded limit
    - S8019247, PR3075: SIGSEGV in compiled method
      c8e.e.t_.getArray(Ljava/lang/Class;)[Ljava/lang/Object
    - S8024511, PR3020: Crash during color profile destruction
    - S8025429, PR3020: [parfait] warnings from b107 for
      sun.java2d.cmm: JNI exception pending
    - S8026702, PR3020: Fix for 8025429 breaks jdk build on windows
    - S8026780, PR3020, RH1142587: Crash on PPC and PPC v2 for
      Java_awt test suit
    - S8047066, PR3020: Test test/sun/awt/image/bug8038000.java
      fails with ClassCastException
    - S8069181, PR3012, RH1015612: java.lang.AssertionError when
      compiling JDK 1.4 code in JDK 8
    - S8158260, PR2992, RH1341258: PPC64: unaligned Unsafe.getInt
      can lead to the generation of illegal instructions (bsc#988651)
    - S8159244, PR3075: Partially initialized string object created
      by C2's string concat optimization may escape
  * Bug fixes
    - PR2799, RH1195203: Files are missing from resources.jar
    - PR2900: Don't use WithSeed versions of NSS functions as they
      don't fully process the seed
    - PR3091: SystemTap is heavily confused by multiple JDKs
    - PR3102: Extend 8022594 to AixPollPort
    - PR3103: Handle case in clean-fonts where
      linux.fontconfig.Gentoo.properties.old has not been created
    - PR3111: Provide option to disable SystemTap tests
    - PR3114: Don't assume system mime.types supports
      text/x-java-source
    - PR3115: Add check for elliptic curve cryptography
      implementation
    - PR3116: Add tests for Java debug info and source files
    - PR3118: Path to agpl-3.0.txt not updated
    - PR3119: Makefile handles cacerts as a symlink, but the
      configure check doesn't
  * AArch64 port
    - S8148328, PR3100: aarch64: redundant lsr instructions in stub
      code.
    - S8148783, PR3100: aarch64: SEGV running SpecJBB2013
    - S8148948, PR3100: aarch64: generate_copy_longs calls align()
      incorrectly
    - S8150045, PR3100: arraycopy causes segfaults in SATB during
      garbage collection
    - S8154537, PR3100: AArch64: some integer rotate instructions
      are never emitted
    - S8154739, PR3100: AArch64: TemplateTable::fast_xaccess loads
      in wrong mode
    - S8157906, PR3100: aarch64: some more integer rotate
      instructions are never emitted
- Enable SunEC for SLE12 and Leap (bsc#982366)

- Fix aarch64 running with 48 bits va space (bsc#984684)


This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2052-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-1.7.0.111-34.1">
      <FullProductName ProductID="java-1_7_0-openjdk-1.7.0.111-34.1">java-1_7_0-openjdk-1.7.0.111-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1">
      <FullProductName ProductID="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1">java-1_7_0-openjdk-accessibility-1.7.0.111-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1">
      <FullProductName ProductID="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1">java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1">
      <FullProductName ProductID="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1">java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1">
      <FullProductName ProductID="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1">java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-demo-1.7.0.111-34.1">
      <FullProductName ProductID="java-1_7_0-openjdk-demo-1.7.0.111-34.1">java-1_7_0-openjdk-demo-1.7.0.111-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-devel-1.7.0.111-34.1">
      <FullProductName ProductID="java-1_7_0-openjdk-devel-1.7.0.111-34.1">java-1_7_0-openjdk-devel-1.7.0.111-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-headless-1.7.0.111-34.1">
      <FullProductName ProductID="java-1_7_0-openjdk-headless-1.7.0.111-34.1">java-1_7_0-openjdk-headless-1.7.0.111-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1">
      <FullProductName ProductID="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1">java-1_7_0-openjdk-javadoc-1.7.0.111-34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-src-1.7.0.111-34.1">
      <FullProductName ProductID="java-1_7_0-openjdk-src-1.7.0.111-34.1">java-1_7_0-openjdk-src-1.7.0.111-34.1</FullProductName>
    </Branch>
    <Relationship ProductReference="java-1_7_0-openjdk-1.7.0.111-34.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:java-1_7_0-openjdk-1.7.0.111-34.1">java-1_7_0-openjdk-1.7.0.111-34.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:java-1_7_0-openjdk-accessibility-1.7.0.111-34.1">java-1_7_0-openjdk-accessibility-1.7.0.111-34.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1">java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1">java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1">java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-demo-1.7.0.111-34.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:java-1_7_0-openjdk-demo-1.7.0.111-34.1">java-1_7_0-openjdk-demo-1.7.0.111-34.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-devel-1.7.0.111-34.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:java-1_7_0-openjdk-devel-1.7.0.111-34.1">java-1_7_0-openjdk-devel-1.7.0.111-34.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-headless-1.7.0.111-34.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:java-1_7_0-openjdk-headless-1.7.0.111-34.1">java-1_7_0-openjdk-headless-1.7.0.111-34.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:java-1_7_0-openjdk-javadoc-1.7.0.111-34.1">java-1_7_0-openjdk-javadoc-1.7.0.111-34.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-src-1.7.0.111-34.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:java-1_7_0-openjdk-src-1.7.0.111-34.1">java-1_7_0-openjdk-src-1.7.0.111-34.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; and Java SE Embedded 8u91 allows remote attackers to affect integrity via vectors related to CORBA.</Note>
    </Notes>
    <CVE>CVE-2016-3458</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-accessibility-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-demo-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-javadoc-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-src-1.7.0.111-34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3458.html</URL>
        <Description>CVE-2016-3458</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989732</URL>
        <Description>SUSE Bug 989732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows local users to affect integrity via vectors related to Networking.</Note>
    </Notes>
    <CVE>CVE-2016-3485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-accessibility-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-demo-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-javadoc-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-src-1.7.0.111-34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3485.html</URL>
        <Description>CVE-2016-3485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009280</URL>
        <Description>SUSE Bug 1009280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989734</URL>
        <Description>SUSE Bug 989734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows remote attackers to affect availability via vectors related to JavaFX.</Note>
    </Notes>
    <CVE>CVE-2016-3498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-accessibility-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-demo-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-javadoc-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-src-1.7.0.111-34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3498.html</URL>
        <Description>CVE-2016-3498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989729</URL>
        <Description>SUSE Bug 989729</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3508.</Note>
    </Notes>
    <CVE>CVE-2016-3500</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-accessibility-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-demo-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-javadoc-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-src-1.7.0.111-34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3500.html</URL>
        <Description>CVE-2016-3500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989730</URL>
        <Description>SUSE Bug 989730</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.</Note>
    </Notes>
    <CVE>CVE-2016-3503</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-accessibility-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-demo-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-javadoc-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-src-1.7.0.111-34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3503.html</URL>
        <Description>CVE-2016-3503</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989728</URL>
        <Description>SUSE Bug 989728</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3500.</Note>
    </Notes>
    <CVE>CVE-2016-3508</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-accessibility-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-demo-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-javadoc-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-src-1.7.0.111-34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3508.html</URL>
        <Description>CVE-2016-3508</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989731</URL>
        <Description>SUSE Bug 989731</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Deployment.</Note>
    </Notes>
    <CVE>CVE-2016-3511</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-accessibility-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-demo-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-javadoc-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-src-1.7.0.111-34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3511.html</URL>
        <Description>CVE-2016-3511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009280</URL>
        <Description>SUSE Bug 1009280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989727</URL>
        <Description>SUSE Bug 989727</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality via vectors related to Hotspot.</Note>
    </Notes>
    <CVE>CVE-2016-3550</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-accessibility-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-demo-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-javadoc-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-src-1.7.0.111-34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3550.html</URL>
        <Description>CVE-2016-3550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989733</URL>
        <Description>SUSE Bug 989733</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610.</Note>
    </Notes>
    <CVE>CVE-2016-3598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-accessibility-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-demo-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-javadoc-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-src-1.7.0.111-34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3598.html</URL>
        <Description>CVE-2016-3598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009280</URL>
        <Description>SUSE Bug 1009280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989723</URL>
        <Description>SUSE Bug 989723</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.</Note>
    </Notes>
    <CVE>CVE-2016-3606</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-accessibility-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-demo-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-javadoc-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-src-1.7.0.111-34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3606.html</URL>
        <Description>CVE-2016-3606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989722</URL>
        <Description>SUSE Bug 989722</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3598.</Note>
    </Notes>
    <CVE>CVE-2016-3610</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-accessibility-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-demo-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-devel-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-headless-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-javadoc-1.7.0.111-34.1</ProductID>
        <ProductID>openSUSE Leap 42.1:java-1_7_0-openjdk-src-1.7.0.111-34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3610.html</URL>
        <Description>CVE-2016-3610</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989725</URL>
        <Description>SUSE Bug 989725</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
