Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-3552 (GCVE-0-2016-3552)
Vulnerability from cvelistv5
Published
2016-07-21 10:00
Modified
2024-10-11 20:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:03:34.043Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "GLSA-201610-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-08" }, { "name": "SUSE-SU-2016:2012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20160721-0001/" }, { "name": "RHSA-2016:1475", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:1475" }, { "name": "92000", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92000" }, { "name": "openSUSE-SU-2016:2051", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" }, { "name": "1036365", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036365" }, { "name": "91787", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "openSUSE-SU-2016:1979", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2016-3552", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-11T19:53:11.822788Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-11T20:46:32.084Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-09T10:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "GLSA-201610-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-08" }, { "name": "SUSE-SU-2016:2012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20160721-0001/" }, { "name": "RHSA-2016:1475", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2016:1475" }, { "name": "92000", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92000" }, { "name": "openSUSE-SU-2016:2051", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" }, { "name": "1036365", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036365" }, { "name": "91787", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "openSUSE-SU-2016:1979", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2016-3552", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "GLSA-201610-08", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-08" }, { "name": "SUSE-SU-2016:2012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" }, { "name": "https://security.netapp.com/advisory/ntap-20160721-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20160721-0001/" }, { "name": "RHSA-2016:1475", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1475" }, { "name": "92000", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92000" }, { "name": "openSUSE-SU-2016:2051", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" }, { "name": "1036365", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036365" }, { "name": "91787", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91787" }, { "name": "openSUSE-SU-2016:1979", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2016-3552", "datePublished": "2016-07-21T10:00:00", "dateReserved": "2016-03-17T00:00:00", "dateUpdated": "2024-10-11T20:46:32.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-3552\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2016-07-21T10:13:49.233\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en Oracle Java SE 8u92 permite usuarios locales afectar la confidencialidad, la integridad y la disponibilidad a trav\u00e9s de vectores relacionados con Install.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.4,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:H/Au:N/C:C/I:C/A:C\",\"baseScore\":6.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":1.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*\",\"matchCriteriaId\":\"95C17CAA-0971-44CB-8A04-F135ACBEFBF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC93807-F81D-4F4C-AD4F-3F0A45C36F34\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/91787\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/92000\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.securitytracker.com/id/1036365\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1475\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://security.gentoo.org/glsa/201610-08\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20160721-0001/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/91787\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/92000\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1036365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1475\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201610-08\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20160721-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/201610-08\", \"name\": \"GLSA-201610-08\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html\", \"name\": \"SUSE-SU-2016:2012\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20160721-0001/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2016:1475\", \"name\": \"RHSA-2016:1475\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/92000\", \"name\": \"92000\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html\", \"name\": \"openSUSE-SU-2016:2051\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1036365\", \"name\": \"1036365\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/91787\", \"name\": \"91787\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html\", \"name\": \"openSUSE-SU-2016:1979\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T00:03:34.043Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2016-3552\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-11T19:53:11.822788Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-11T19:53:37.264Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2016-07-19T00:00:00\", \"references\": [{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://security.gentoo.org/glsa/201610-08\", \"name\": \"GLSA-201610-08\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html\", \"name\": \"SUSE-SU-2016:2012\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20160721-0001/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2016:1475\", \"name\": \"RHSA-2016:1475\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://www.securityfocus.com/bid/92000\", \"name\": \"92000\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html\", \"name\": \"openSUSE-SU-2016:2051\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://www.securitytracker.com/id/1036365\", \"name\": \"1036365\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}, {\"url\": \"http://www.securityfocus.com/bid/91787\", \"name\": \"91787\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html\", \"name\": \"openSUSE-SU-2016:1979\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2017-11-09T10:57:01\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"n/a\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\", \"name\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://security.gentoo.org/glsa/201610-08\", \"name\": \"GLSA-201610-08\", \"refsource\": \"GENTOO\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html\", \"name\": \"SUSE-SU-2016:2012\", \"refsource\": \"SUSE\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20160721-0001/\", \"name\": \"https://security.netapp.com/advisory/ntap-20160721-0001/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2016:1475\", \"name\": \"RHSA-2016:1475\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://www.securityfocus.com/bid/92000\", \"name\": \"92000\", \"refsource\": \"BID\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html\", \"name\": \"openSUSE-SU-2016:2051\", \"refsource\": \"SUSE\"}, {\"url\": \"http://www.securitytracker.com/id/1036365\", \"name\": \"1036365\", \"refsource\": \"SECTRACK\"}, {\"url\": \"http://www.securityfocus.com/bid/91787\", \"name\": \"91787\", \"refsource\": \"BID\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html\", \"name\": \"openSUSE-SU-2016:1979\", \"refsource\": \"SUSE\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2016-3552\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"secalert_us@oracle.com\"}}}}", "cveMetadata": "{\"cveId\": \"CVE-2016-3552\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-11T20:46:32.084Z\", \"dateReserved\": \"2016-03-17T00:00:00\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2016-07-21T10:00:00\", \"assignerShortName\": \"oracle\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
gsd-2016-3552
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-3552", "description": "Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.", "id": "GSD-2016-3552", "references": [ "https://www.suse.com/security/cve/CVE-2016-3552.html", "https://access.redhat.com/errata/RHSA-2016:1475" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-3552" ], "details": "Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.", "id": "GSD-2016-3552", "modified": "2023-12-13T01:21:27.464653Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2016-3552", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "GLSA-201610-08", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-08" }, { "name": "SUSE-SU-2016:2012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" }, { "name": "https://security.netapp.com/advisory/ntap-20160721-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20160721-0001/" }, { "name": "RHSA-2016:1475", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1475" }, { "name": "92000", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92000" }, { "name": "openSUSE-SU-2016:2051", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" }, { "name": "1036365", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036365" }, { "name": "91787", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91787" }, { "name": "openSUSE-SU-2016:1979", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2016-3552" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "91787", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "SUSE-SU-2016:2012", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" }, { "name": "openSUSE-SU-2016:2051", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" }, { "name": "92000", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/92000" }, { "name": "RHSA-2016:1475", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2016:1475" }, { "name": "openSUSE-SU-2016:1979", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" }, { "name": "GLSA-201610-08", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201610-08" }, { "name": "1036365", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1036365" }, { "name": "https://security.netapp.com/advisory/ntap-20160721-0001/", "refsource": "CONFIRM", "tags": [], "url": "https://security.netapp.com/advisory/ntap-20160721-0001/" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.4, "impactScore": 6.0 } }, "lastModifiedDate": "2022-05-13T14:57Z", "publishedDate": "2016-07-21T10:13Z" } } }
suse-su-2016:2012-1
Vulnerability from csaf_suse
Published
2016-08-09 11:33
Modified
2016-08-09 11:33
Summary
Security update for java-1_8_0-openjdk
Notes
Title of the patch
Security update for java-1_8_0-openjdk
Description of the patch
This update for java-1_8_0-openjdk fixes the following issues:
- Upgrade to version jdk8u101 (icedtea 3.1.0)
- New in release 3.1.0 (2016-07-25):
* Security fixes
- S8079718, CVE-2016-3458: IIOP Input Stream Hooking
(bsc#989732)
- S8145446, CVE-2016-3485: Perfect pipe placement (Windows
only) (bsc#989734)
- S8146514: Enforce GCM limits
- S8147771: Construction of static protection domains under
Javax custom policy
- S8148872, CVE-2016-3500: Complete name checking (bsc#989730)
- S8149070: Enforce update ordering
- S8149962, CVE-2016-3508: Better delineation of XML processing
(bsc#989731)
- S8150752: Share Class Data
- S8151925: Font reference improvements
- S8152479, CVE-2016-3550: Coded byte streams (bsc#989733)
- S8153312: Constrain AppCDS behavior
- S8154475, CVE-2016-3587: Clean up lookup visibility
(bsc#989721)
- S8155981, CVE-2016-3606: Bolster bytecode verification
(bsc#989722)
- S8155985, CVE-2016-3598: Persistent Parameter Processing
(bsc#989723)
- S8158571, CVE-2016-3610: Additional method handle validation
(bsc#989725)
- CVE-2016-3552 (bsc#989726)
- CVE-2016-3511 (bsc#989727)
- CVE-2016-3503 (bsc#989728)
- CVE-2016-3498 (bsc#989729)
* New features
- S8145547, PR1061: [AWT/Swing] Conditional support for GTK 3
on Linux
- PR2821: Support building OpenJDK with --disable-headful
- PR2931, G478960: Provide Infinality Support via fontconfig
- PR3079: Provide option to build Shenandoah on x86_64
* Import of OpenJDK 8 u92 build 14
- S6869327: Add new C2 flag to keep safepoints in counted
loops.
- S8022865: [TESTBUG] Compressed Oops testing needs to be
revised
- S8029630: Thread id should be displayed as a hex number in
error report
- S8029726: On OS X some dtrace probe names are mismatched with
Solaris
- S8029727: On OS X dtrace probes
Call<type>MethodA/Call<type>MethodV are not fired.
- S8029728: On OS X dtrace probes SetStaticBooleanField are not
fired
- S8038184: XMLSignature throws StringIndexOutOfBoundsException
if ID attribute value is empty String
- S8038349: Signing XML with DSA throws Exception when key is
larger than 1024 bits
- S8041501: ImageIO reader is not capable of reading JPEGs
without JFIF header
- S8041900: [macosx] Java forces the use of discrete GPU
- S8044363: Remove special build options for unpack200 executable
- S8046471: Use OPENJDK_TARGET_CPU_ARCH instead of legacy value
for hotspot ARCH
- S8046611: Build errors with gcc on sparc/fastdebug
- S8047763: Recognize sparc64 as a sparc platform
- S8048232: Fix for 8046471 breaks PPC64 build
- S8052396: Catch exceptions resulting from missing font cmap
- S8058563: InstanceKlass::_dependencies list isn't cleared from
empty nmethodBucket entries
- S8061624: [TESTBUG] Some tests cannot be ran under compact
profiles and therefore shall be excluded
- S8062901: Iterators is spelled incorrectly in the Javadoc for
Spliterator
- S8064330: Remove SHA224 from the default support list if
SunMSCAPI enabled
- S8065579: WB method to start G1 concurrent mark cycle should
be introduced
- S8065986: Compiler fails to NullPointerException when calling
super with Object<>()
- S8066974: Compiler doesn't infer method's generic type
information in lambda body
- S8067800: Clarify java.time.chrono.Chronology.isLeapYear for
out of range years
- S8068033: JNI exception pending in jdk/src/share/bin/java.c
- S8068042: Check jdk/src/share/native/sun/misc/URLClassPath.c
for JNI pending
- S8068162: jvmtiRedefineClasses.cpp: guarantee(false) failed:
OLD and/or OBSOLETE method(s) found
- S8068254: Method reference uses wrong qualifying type
- S8074696: Remote debugging session hangs for several minutes
when calling findBootType
- S8074935: jdk8 keytool doesn't validate pem files for RFC 1421
correctness, as jdk7 did
- S8078423: [TESTBUG] javax/print/PrintSEUmlauts/PrintSEUmlauts.java
relies on system locale
- S8080492: [Parfait] Uninitialised variable in
jdk/src/java/desktop/windows/native/libawt/
- S8080650: Enable stubs to use frame pointers correctly
- S8122944: perfdata used is seen as too high on sparc zone with
jdk1.9 and causes a test failure
- S8129348: Debugger hangs in trace mode with TRACE_SENDS
- S8129847: Compiling methods generated by Nashorn triggers high
memory usage in C2
- S8130506: javac AssertionError when invoking
MethodHandle.invoke with lambda parameter
- S8130910: hsperfdata file is created in wrong directory and
not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
- S8131129: Attempt to define a duplicate BMH$Species class
- S8131665: Bad exception message in HandshakeHash.getFinishedHash
- S8131782: C1 Class.cast optimization breaks when Class is
loaded from static final
- S8132503: [macosx] Chinese full stop symbol cannot be entered
with Pinyin IM on OS X
- S8133207: ParallelProbes.java test fails after changes for
JDK-8080115
- S8133924: NPE may be thrown when xsltc select a non-existing
node after JDK-8062518
- S8134007: Improve string folding
- S8134759: jdb: Incorrect stepping inside finally block
- S8134963: [Newtest] New stress test for changing the coarseness
level of G1 remembered set
- S8136442: Don't tie Certificate signature algorithms to
ciphersuites
- S8137106: EUDC (End User Defined Characters) are not displayed
on Windows with Java 8u60+
- S8138745: Implement ExitOnOutOfMemory and CrashOnOutOfMemory
in HotSpot
- S8138764: In some cases the usage of TreeLock can be replaced
by other synchronization
- S8139373: [TEST_BUG] java/net/MulticastSocket/MultiDead.java
failed with timeout
- S8139424: SIGSEGV, Problematic frame: # V [libjvm.so+0xd0c0cc]
void InstanceKlass::oop_oop_iterate_oop_maps_specialized<true,oopDesc*,MarkAndPushClosure>
- S8139436: sun.security.mscapi.KeyStore might load incomplete
data
- S8139751: Javac crash with -XDallowStringFolding=false
- S8139863: [TESTBUG] Need to port tests for JDK-8134903 to
8u-dev
- S8139985: JNI exception pending in
jdk/src/jdk/hprof/agent/share/native/libhprof
- S8140031: SA: Searching for a value in Threads does not work
- S8140249: JVM Crashing During startUp If Flight Recording is
enabled
- S8140344: add support for 3 digit update release numbers
- S8140587: Atomic*FieldUpdaters should use Class.isInstance
instead of direct class check
- S8141260: isReachable crash in windows xp
- S8143297: Nashorn compilation time reported in nanoseconds
- S8143397: It looks like InetAddress.isReachable(timeout) works
incorrectly
- S8143855: Bad printf formatting in frame_zero.cpp
- S8143896: java.lang.Long is implicitly converted to double
- S8143963: improve ClassLoader::trace_class_path to accept an
additional outputStream* arg
- S8144020: Remove long as an internal numeric type
- S8144131: ArrayData.getInt implementations do not convert to
int32
- S8144483: One long Safepoint pause directly after each GC log
rotation
- S8144487: PhaseIdealLoop::build_and_optimize() must restore
major_progress flag if skip_loop_opts is true
- S8144885: agent/src/os/linux/libproc.h needs to support
Linux/SPARC builds
- S8144935: C2: safepoint is pruned from a non-counted loop
- S8144937: [TEST_BUG] testlibrary_tests should be excluded for
compact1 and compact2 execution
- S8145017: Add support for 3 digit hotspot minor version numbers
- S8145099: Better error message when SA can't attach to a process
- S8145442: Add the facility to verify remembered sets for G1
- S8145466: javac: No line numbers in compilation error
- S8145539: (coll) AbstractMap.keySet and .values should not be
volatile
- S8145550: Megamorphic invoke should use CompiledFunction
variants without any LinkLogic
- S8145669: apply2call optimized callsite fails after becoming
megamorphic
- S8145722: NullPointerException in javadoc
- S8145754: PhaseIdealLoop::is_scaled_iv_plus_offset() does not
match AddI
- S8146147: Java linker indexed property getter does not work
for computed nashorn string
- S8146566: OpenJDK build can't handle commas in LDFLAGS
- S8146725: Issues with SignatureAndHashAlgorithm.getSupportedAlgorithms
- S8146979: Backport of 8046471 breaks ppc64 build in jdk8u
because 8072383 was badly backported before
- S8147087: Race when reusing PerRegionTable bitmaps may result
in dropped remembered set entries
- S8147630: Wrong test result pushed to 8u-dev
- S8147845: Varargs Array functions still leaking longs
- S8147857: RMIConnector logs attribute names incorrectly
- S8148353: [linux-sparc] Crash in libawt.so on Linux SPARC
- S8150791: 8u76 L10n resource file translation update
* Import of OpenJDK 8 u101 build 13
- S6483657: MSCAPI provider does not create unique alias names
- S6675699: need comprehensive fix for unconstrained ConvI2L
with narrowed type
- S8037557: test SessionCacheSizeTests.java timeout
- S8038837: Add support to jarsigner for specifying timestamp
hash algorithm
- S8081778: Use Intel x64 CPU instructions for RSA acceleration
- S8130150: Implement BigInteger.montgomeryMultiply intrinsic
- S8130735: javax.swing.TimerQueue: timer fires late when
another timer starts
- S8143913: MSCAPI keystore should accept Certificate[] in
setEntry()
- S8144313: Test SessionTimeOutTests can be timeout
- S8146240: Three nashorn files contain 'GNU General Public
License' header
- S8146387: Test SSLSession/SessionCacheSizeTests socket accept
timed out
- S8146669: Test SessionTimeOutTests fails intermittently
- S8146993: Several javax/management/remote/mandatory regression
tests fail after JDK-8138811
- S8147994: [macosx] JScrollPane jitters up/down during trackpad
scrolling on MacOS/Aqua
- S8151522: Disable 8130150 and 8081778 intrinsics by default
- S8151876: (tz) Support tzdata2016d
- S8152098: Fix 8151522 caused test
compiler/intrinsics/squaretolen/TestSquareToLen.java to fail
- S8157077: 8u101 L10n resource file updates
* Backports
- S6260348, PR3066: GTK+ L&F JTextComponent not respecting
desktop caret blink rate
- S6778087, PR1061: getLocationOnScreen() always returns (0, 0)
for mouse wheel events
- S6961123, PR2972: setWMClass fails to null-terminate WM_CLASS
string
- S8008657, PR3077: JSpinner setComponentOrientation doesn't
affect on text orientation
- S8014212, PR2866: Robot captures black screen
- S8029339, PR1061: Custom MultiResolution image support on
HiDPI displays
- S8031145, PR3077: Re-examine closed i18n tests to see it they
can be moved to the jdk repository.
- S8034856, PR3095: gcc warnings compiling
src/solaris/native/sun/security/pkcs11
- S8034857, PR3095: gcc warnings compiling
src/solaris/native/sun/management
- S8035054, PR3095: JarFacade.c should not include ctype.h
- S8035287, PR3095: gcc warnings compiling various libraries
files
- S8038631, PR3077: Create wrapper for awt.Robot with additional
functionality
- S8039279, PR3077: Move awt tests to openjdk repository
- S8041561, PR3077: Inconsistent opacity behaviour between
JCheckBox and JRadioButton
- S8041592, PR3077: [TEST_BUG] Move 42 AWT hw/lw mixing tests
to jdk
- S8041915, PR3077: Move 8 awt tests to OpenJDK regression
tests tree
- S8043126, PR3077: move awt automated functional tests from
AWT_Events/Lw and AWT_Events/AWT to OpenJDK repository
- S8043131, PR3077: Move ShapedAndTranslucentWindows and GC
functional AWT tests to regression tree
- S8044157, PR3077: [TEST_BUG] Improve recently submitted
AWT_Mixing tests
- S8044172, PR3077: [TEST_BUG] Move regtests for 4523758 and
AltPlusNumberKeyCombinationsTest to jdk
- S8044429, PR3077: move awt automated tests for AWT_Modality
to OpenJDK repository
- S8044762, PR2960: com/sun/jdi/OptionTest.java test time out
- S8044765, PR3077: Move functional tests
AWT_SystemTray/Automated to openjdk repository
- S8047180, PR3077: Move functional tests AWT_Headless/Automated
to OpenJDK repository
- S8047367, PR3077: move awt automated tests from AWT_Modality
to OpenJDK repository - part 2
- S8048246, PR3077: Move AWT_DnD/Clipboard/Automated functional
tests to OpenJDK
- S8049226, PR2960: com/sun/jdi/OptionTest.java test times out
again
- S8049617, PR3077: move awt automated tests from AWT_Modality
to OpenJDK repository - part 3
- S8049694, PR3077: Migrate functional
AWT_DesktopProperties/Automated tests to OpenJDK
- S8050885, PR3077: move awt automated tests from AWT_Modality
to OpenJDK repository - part 4
- S8051440, PR3077: move tests about maximizing undecorated to
OpenJDK
- S8052012, PR3077: move awt automated tests from AWT_Modality
to OpenJDK repository - part 5
- S8052408, PR3077: Move AWT_BAT functional tests to OpenJDK (3
of 3)
- S8053657, PR3077: [TEST_BUG] move some 5 tests related to
undecorated Frame/JFrame to JDK
- S8054143, PR3077: move awt automated tests from AWT_Modality
to OpenJDK repository - part 6
- S8054358, PR3077: move awt automated tests from AWT_Modality
to OpenJDK repository - part 7
- S8054359, PR3077: move awt automated tests from AWT_Modality
to OpenJDK repository - part 8
- S8055360, PR3077: Move the rest part of AWT
ShapedAndTranslucent tests to OpenJDK
- S8055664, PR3077: move 14 tests about setLocationRelativeTo
to jdk
- S8055836, PR3077: move awt tests from AWT_Modality to OpenJDK
repository - part 9
- S8056911, PR3077: Remove internal API usage from ExtendedRobot
class
- S8057694, PR3077: move awt tests from AWT_Modality to OpenJDK
repository - part 10
- S8058959, PR1061: closed/java/awt/event/ComponentEvent/MovedResizedTwiceTest/MovedResizedTwiceTest.java
failed automatically
- S8062606, PR3077: Fix a typo in java.awt.Robot class
- S8063102, PR3077: Change open awt regression tests to avoid
sun.awt.SunToolkit.realSync, part 1
- S8063104, PR3077: Change open awt regression tests to avoid
sun.awt.SunToolkit.realSync, part 2
- S8063106, PR3077: Change open swing regression tests to avoid
sun.awt.SunToolkit.realSync, part 1
- S8063107, PR3077: Change open swing regression tests to avoid
sun.awt.SunToolkit.realSync, part 2
- S8064573, PR3077: [TEST_BUG] javax/swing/text/AbstractDocument/6968363/Test6968363.java
is asocial pressing VK_LEFT and not releasing
- S8064575, PR3077: [TEST_BUG] javax/swing/JEditorPane/6917744/bug6917744.java
100 times press keys and never releases
- S8064809, PR3077: [TEST_BUG] javax/swing/JComboBox/4199622/bug4199622.java
contains a lot of keyPress and not a single keyRelease
- S8067441, PR3077: Some tests fails with error: cannot find symbol
getSystemMnemonicKeyCodes()
- S8068228, PR3077: Test closed/java/awt/Mouse/MaximizedFrameTest/MaximizedFrameTest
fails with GTKLookAndFeel
- S8069361, PR1061: SunGraphics2D.getDefaultTransform() does not
include scale factor
- S8073320, PR1061: Windows HiDPI Graphics support
- S8074807, PR3077: Fix some tests unnecessary using internal API
- S8076315, PR3077: move 4 manual functional swing tests to
regression suite
- S8078504, PR3094: Zero lacks declaration of
VM_Version::initialize()
- S8129822, PR3077: Define 'headful' jtreg keyword
- S8132123, PR1061: MultiResolutionCachedImage unnecessarily
creates base image to get its size
- S8133539, PR1061: [TEST_BUG] Split
java/awt/image/MultiResolutionImageTest.java in two to allow
restricted access
- S8137571, PR1061: Linux HiDPI Graphics support
- S8142406, PR1061: [TEST] MultiResolution image: need test to
cover the case when @2x image is corrupted
- S8145188, PR2945: No LocalVariableTable generated for the
entire JDK
- S8150258, PR1061: [TEST] HiDPI: create a test for
multiresolution menu items icons
- S8150724, PR1061: [TEST] HiDPI: create a test for
multiresolution icons
- S8150844, PR1061: [hidpi] [macosx] -Dsun.java2d.uiScale should
be taken into account for OS X
- S8151841, PR2882: Build needs additional flags to compile with
GCC 6 [plus parts of 8149647 & 8032045]
- S8155613, PR1061: [PIT] crash in
AWT_Desktop/Automated/Exceptions/BasicTest
- S8156020, PR1061: 8145547 breaks AIX and and uses RTLD_NOLOAD
incorrectly
- S8156128, PR1061: Tests for [AWT/Swing] Conditional support
for GTK 3 on Linux
- S8158260, PR2991, RH1341258: PPC64: unaligned Unsafe.getInt
can lead to the generation of illegal instructions (bsc#988651)
- S8159244, PR3074: Partially initialized string object created
by C2's string concat optimization may escape
- S8159690, PR3077: [TESTBUG] Mark headful tests with @key
headful.
- S8160294, PR2882, PR3095: Some client libraries cannot be
built with GCC 6
* Bug fixes
- PR1958: GTKLookAndFeel does not honor
gtk-alternative-button-order
- PR2822: Feed LIBS & CFLAGS into configure rather than make to
avoid re-discovery by OpenJDK configure
- PR2932: Support ccache in a non-automagic manner
- PR2933: Support ccache 3.2 and later
- PR2964: Set system defaults based on OS
- PR2974, RH1337583: PKCS#10 certificate requests now use CRLF
line endings rather than system line endings
- PR3078: Remove duplicated line dating back to 6788347 and
6894807
- PR3083, RH1346460: Regression in SSL debug output without an
ECC provider
- PR3089: Remove old memory limits patch
- PR3090, RH1204159: SystemTap is heavily confused by multiple
JDKs
- PR3095: Fix warnings in URLClassPath.c
- PR3096: Remove dead --disable-optimizations option
- PR3105: Use version from hotspot.map to create tarball filename
- PR3106: Handle both correctly-spelt property
'enableCustomValueHandler' introduced by S8079718 and typo
version
- PR3108: Shenandoah patches not included in release tarball
- PR3110: Update hotspot.map documentation in INSTALL
* AArch64 port
- S8145320, PR3078: Create unsafe_arraycopy and
generic_arraycopy for AArch64
- S8148328, PR3078: aarch64: redundant lsr instructions in stub
code.
- S8148783, PR3078: aarch64: SEGV running SpecJBB2013
- S8148948, PR3078: aarch64: generate_copy_longs calls align()
incorrectly
- S8149080, PR3078: AArch64: Recognise disjoint array copy in
stub code
- S8149365, PR3078: aarch64: memory copy does not prefetch on
backwards copy
- S8149907, PR3078: aarch64: use load/store pair instructions
in call_stub
- S8150038, PR3078: aarch64: make use of CBZ and CBNZ when
comparing narrow pointer with zero
- S8150045, PR3078: arraycopy causes segfaults in SATB during
garbage collection
- S8150082, PR3078: aarch64: optimise small array copy
- S8150229, PR3078: aarch64: pipeline class for several
instructions is not set correctly
- S8150313, PR3078: aarch64: optimise array copy using SIMD
instructions
- S8150394, PR3078: aarch64: add support for 8.1 LSE CAS
instructions
- S8151340, PR3078: aarch64: prefetch the destination word for
write prior to ldxr/stxr loops.
- S8151502, PR3078: optimize pd_disjoint_words and
pd_conjoint_words
- S8151775, PR3078: aarch64: add support for 8.1 LSE atomic
operations
- S8152537, PR3078: aarch64: Make use of CBZ and CBNZ when
comparing unsigned values with zero.
- S8152840, PR3078: aarch64: improve _unsafe_arraycopy stub
routine
- S8153713, PR3078: aarch64: improve short array clearing using
store pair
- S8153797, PR3078: aarch64: Add Arrays.fill stub code
- S8154537, PR3078: AArch64: some integer rotate instructions
are never emitted
- S8154739, PR3078: AArch64: TemplateTable::fast_xaccess loads
in wrong mode
- S8155015, PR3078: Aarch64: bad assert in spill generation
code
- S8155100, PR3078: AArch64: Relax alignment requirement for
byte_map_base
- S8155612, PR3078: Aarch64: vector nodes need to support
misaligned offset
- S8155617, PR3078: aarch64: ClearArray does not use DC ZVA
- S8155653, PR3078: TestVectorUnalignedOffset.java not pushed
with 8155612
- S8156731, PR3078: aarch64: java/util/Arrays/Correct.java fails
due to _generic_arraycopy stub routine
- S8157841, PR3078: aarch64: prefetch ignores cache line size
- S8157906, PR3078: aarch64: some more integer rotate
instructions are never emitted
- S8158913, PR3078: aarch64: SEGV running Spark terasort
- S8159052, PR3078: aarch64: optimise unaligned copies in
pd_disjoint_words and pd_conjoint_words
- S8159063, PR3078: aarch64: optimise unaligned array copy long
- PR3078: Cleanup remaining differences from aarch64/jdk8u tree
- Fix script linking /usr/share/javazi/tzdb.dat for platform where
it applies (bsc#987895)
- Fix aarch64 running with 48 bits va space (bsc#984684)
avoid some crashes
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1187,SUSE-SLE-SERVER-12-SP1-2016-1187
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for java-1_8_0-openjdk fixes the following issues:\n\n- Upgrade to version jdk8u101 (icedtea 3.1.0)\n- New in release 3.1.0 (2016-07-25):\n * Security fixes\n - S8079718, CVE-2016-3458: IIOP Input Stream Hooking\n (bsc#989732)\n - S8145446, CVE-2016-3485: Perfect pipe placement (Windows\n only) (bsc#989734)\n - S8146514: Enforce GCM limits\n - S8147771: Construction of static protection domains under\n Javax custom policy\n - S8148872, CVE-2016-3500: Complete name checking (bsc#989730)\n - S8149070: Enforce update ordering\n - S8149962, CVE-2016-3508: Better delineation of XML processing\n (bsc#989731)\n - S8150752: Share Class Data\n - S8151925: Font reference improvements\n - S8152479, CVE-2016-3550: Coded byte streams (bsc#989733)\n - S8153312: Constrain AppCDS behavior\n - S8154475, CVE-2016-3587: Clean up lookup visibility\n (bsc#989721)\n - S8155981, CVE-2016-3606: Bolster bytecode verification\n (bsc#989722)\n - S8155985, CVE-2016-3598: Persistent Parameter Processing\n (bsc#989723)\n - S8158571, CVE-2016-3610: Additional method handle validation\n (bsc#989725)\n - CVE-2016-3552 (bsc#989726)\n - CVE-2016-3511 (bsc#989727)\n - CVE-2016-3503 (bsc#989728)\n - CVE-2016-3498 (bsc#989729)\n * New features\n - S8145547, PR1061: [AWT/Swing] Conditional support for GTK 3\n on Linux\n - PR2821: Support building OpenJDK with --disable-headful\n - PR2931, G478960: Provide Infinality Support via fontconfig\n - PR3079: Provide option to build Shenandoah on x86_64\n * Import of OpenJDK 8 u92 build 14\n - S6869327: Add new C2 flag to keep safepoints in counted\n loops.\n - S8022865: [TESTBUG] Compressed Oops testing needs to be\n revised\n - S8029630: Thread id should be displayed as a hex number in\n error report\n - S8029726: On OS X some dtrace probe names are mismatched with\n Solaris\n - S8029727: On OS X dtrace probes\n Call\u003ctype\u003eMethodA/Call\u003ctype\u003eMethodV are not fired.\n - S8029728: On OS X dtrace probes SetStaticBooleanField are not\n fired\n - S8038184: XMLSignature throws StringIndexOutOfBoundsException\n if ID attribute value is empty String\n - S8038349: Signing XML with DSA throws Exception when key is\n larger than 1024 bits\n - S8041501: ImageIO reader is not capable of reading JPEGs\n without JFIF header\n - S8041900: [macosx] Java forces the use of discrete GPU\n - S8044363: Remove special build options for unpack200 executable\n - S8046471: Use OPENJDK_TARGET_CPU_ARCH instead of legacy value\n for hotspot ARCH\n - S8046611: Build errors with gcc on sparc/fastdebug\n - S8047763: Recognize sparc64 as a sparc platform\n - S8048232: Fix for 8046471 breaks PPC64 build\n - S8052396: Catch exceptions resulting from missing font cmap\n - S8058563: InstanceKlass::_dependencies list isn\u0027t cleared from\n empty nmethodBucket entries\n - S8061624: [TESTBUG] Some tests cannot be ran under compact\n profiles and therefore shall be excluded\n - S8062901: Iterators is spelled incorrectly in the Javadoc for\n Spliterator\n - S8064330: Remove SHA224 from the default support list if\n SunMSCAPI enabled\n - S8065579: WB method to start G1 concurrent mark cycle should\n be introduced\n - S8065986: Compiler fails to NullPointerException when calling\n super with Object\u003c\u003e()\n - S8066974: Compiler doesn\u0027t infer method\u0027s generic type\n information in lambda body\n - S8067800: Clarify java.time.chrono.Chronology.isLeapYear for\n out of range years\n - S8068033: JNI exception pending in jdk/src/share/bin/java.c\n - S8068042: Check jdk/src/share/native/sun/misc/URLClassPath.c\n for JNI pending\n - S8068162: jvmtiRedefineClasses.cpp: guarantee(false) failed:\n OLD and/or OBSOLETE method(s) found\n - S8068254: Method reference uses wrong qualifying type\n - S8074696: Remote debugging session hangs for several minutes\n when calling findBootType\n - S8074935: jdk8 keytool doesn\u0027t validate pem files for RFC 1421\n correctness, as jdk7 did\n - S8078423: [TESTBUG] javax/print/PrintSEUmlauts/PrintSEUmlauts.java\n relies on system locale\n - S8080492: [Parfait] Uninitialised variable in\n jdk/src/java/desktop/windows/native/libawt/\n - S8080650: Enable stubs to use frame pointers correctly\n - S8122944: perfdata used is seen as too high on sparc zone with\n jdk1.9 and causes a test failure\n - S8129348: Debugger hangs in trace mode with TRACE_SENDS\n - S8129847: Compiling methods generated by Nashorn triggers high\n memory usage in C2\n - S8130506: javac AssertionError when invoking\n MethodHandle.invoke with lambda parameter\n - S8130910: hsperfdata file is created in wrong directory and\n not cleaned up if /tmp/hsperfdata_\u003cusername\u003e has wrong permissions\n - S8131129: Attempt to define a duplicate BMH$Species class\n - S8131665: Bad exception message in HandshakeHash.getFinishedHash\n - S8131782: C1 Class.cast optimization breaks when Class is\n loaded from static final\n - S8132503: [macosx] Chinese full stop symbol cannot be entered\n with Pinyin IM on OS X\n - S8133207: ParallelProbes.java test fails after changes for\n JDK-8080115\n - S8133924: NPE may be thrown when xsltc select a non-existing\n node after JDK-8062518\n - S8134007: Improve string folding\n - S8134759: jdb: Incorrect stepping inside finally block\n - S8134963: [Newtest] New stress test for changing the coarseness\n level of G1 remembered set\n - S8136442: Don\u0027t tie Certificate signature algorithms to\n ciphersuites\n - S8137106: EUDC (End User Defined Characters) are not displayed\n on Windows with Java 8u60+\n - S8138745: Implement ExitOnOutOfMemory and CrashOnOutOfMemory\n in HotSpot\n - S8138764: In some cases the usage of TreeLock can be replaced\n by other synchronization\n - S8139373: [TEST_BUG] java/net/MulticastSocket/MultiDead.java\n failed with timeout\n - S8139424: SIGSEGV, Problematic frame: # V [libjvm.so+0xd0c0cc]\n void InstanceKlass::oop_oop_iterate_oop_maps_specialized\u003ctrue,oopDesc*,MarkAndPushClosure\u003e\n - S8139436: sun.security.mscapi.KeyStore might load incomplete\n data\n - S8139751: Javac crash with -XDallowStringFolding=false\n - S8139863: [TESTBUG] Need to port tests for JDK-8134903 to\n 8u-dev\n - S8139985: JNI exception pending in\n jdk/src/jdk/hprof/agent/share/native/libhprof\n - S8140031: SA: Searching for a value in Threads does not work\n - S8140249: JVM Crashing During startUp If Flight Recording is\n enabled\n - S8140344: add support for 3 digit update release numbers\n - S8140587: Atomic*FieldUpdaters should use Class.isInstance\n instead of direct class check\n - S8141260: isReachable crash in windows xp\n - S8143297: Nashorn compilation time reported in nanoseconds\n - S8143397: It looks like InetAddress.isReachable(timeout) works\n incorrectly\n - S8143855: Bad printf formatting in frame_zero.cpp\n - S8143896: java.lang.Long is implicitly converted to double\n - S8143963: improve ClassLoader::trace_class_path to accept an\n additional outputStream* arg\n - S8144020: Remove long as an internal numeric type\n - S8144131: ArrayData.getInt implementations do not convert to\n int32\n - S8144483: One long Safepoint pause directly after each GC log\n rotation\n - S8144487: PhaseIdealLoop::build_and_optimize() must restore\n major_progress flag if skip_loop_opts is true\n - S8144885: agent/src/os/linux/libproc.h needs to support\n Linux/SPARC builds\n - S8144935: C2: safepoint is pruned from a non-counted loop\n - S8144937: [TEST_BUG] testlibrary_tests should be excluded for\n compact1 and compact2 execution\n - S8145017: Add support for 3 digit hotspot minor version numbers\n - S8145099: Better error message when SA can\u0027t attach to a process\n - S8145442: Add the facility to verify remembered sets for G1\n - S8145466: javac: No line numbers in compilation error\n - S8145539: (coll) AbstractMap.keySet and .values should not be\n volatile\n - S8145550: Megamorphic invoke should use CompiledFunction\n variants without any LinkLogic\n - S8145669: apply2call optimized callsite fails after becoming\n megamorphic\n - S8145722: NullPointerException in javadoc\n - S8145754: PhaseIdealLoop::is_scaled_iv_plus_offset() does not\n match AddI\n - S8146147: Java linker indexed property getter does not work\n for computed nashorn string\n - S8146566: OpenJDK build can\u0027t handle commas in LDFLAGS\n - S8146725: Issues with SignatureAndHashAlgorithm.getSupportedAlgorithms\n - S8146979: Backport of 8046471 breaks ppc64 build in jdk8u\n because 8072383 was badly backported before\n - S8147087: Race when reusing PerRegionTable bitmaps may result\n in dropped remembered set entries\n - S8147630: Wrong test result pushed to 8u-dev\n - S8147845: Varargs Array functions still leaking longs\n - S8147857: RMIConnector logs attribute names incorrectly\n - S8148353: [linux-sparc] Crash in libawt.so on Linux SPARC\n - S8150791: 8u76 L10n resource file translation update\n * Import of OpenJDK 8 u101 build 13\n - S6483657: MSCAPI provider does not create unique alias names\n - S6675699: need comprehensive fix for unconstrained ConvI2L\n with narrowed type\n - S8037557: test SessionCacheSizeTests.java timeout\n - S8038837: Add support to jarsigner for specifying timestamp\n hash algorithm\n - S8081778: Use Intel x64 CPU instructions for RSA acceleration\n - S8130150: Implement BigInteger.montgomeryMultiply intrinsic\n - S8130735: javax.swing.TimerQueue: timer fires late when\n another timer starts\n - S8143913: MSCAPI keystore should accept Certificate[] in\n setEntry()\n - S8144313: Test SessionTimeOutTests can be timeout\n - S8146240: Three nashorn files contain \u0027GNU General Public\n License\u0027 header\n - S8146387: Test SSLSession/SessionCacheSizeTests socket accept\n timed out\n - S8146669: Test SessionTimeOutTests fails intermittently\n - S8146993: Several javax/management/remote/mandatory regression\n tests fail after JDK-8138811\n - S8147994: [macosx] JScrollPane jitters up/down during trackpad\n scrolling on MacOS/Aqua\n - S8151522: Disable 8130150 and 8081778 intrinsics by default\n - S8151876: (tz) Support tzdata2016d\n - S8152098: Fix 8151522 caused test\n compiler/intrinsics/squaretolen/TestSquareToLen.java to fail\n - S8157077: 8u101 L10n resource file updates\n * Backports\n - S6260348, PR3066: GTK+ L\u0026F JTextComponent not respecting\n desktop caret blink rate\n - S6778087, PR1061: getLocationOnScreen() always returns (0, 0)\n for mouse wheel events\n - S6961123, PR2972: setWMClass fails to null-terminate WM_CLASS\n string\n - S8008657, PR3077: JSpinner setComponentOrientation doesn\u0027t\n affect on text orientation\n - S8014212, PR2866: Robot captures black screen\n - S8029339, PR1061: Custom MultiResolution image support on\n HiDPI displays\n - S8031145, PR3077: Re-examine closed i18n tests to see it they\n can be moved to the jdk repository.\n - S8034856, PR3095: gcc warnings compiling\n src/solaris/native/sun/security/pkcs11\n - S8034857, PR3095: gcc warnings compiling\n src/solaris/native/sun/management\n - S8035054, PR3095: JarFacade.c should not include ctype.h\n - S8035287, PR3095: gcc warnings compiling various libraries\n files\n - S8038631, PR3077: Create wrapper for awt.Robot with additional\n functionality\n - S8039279, PR3077: Move awt tests to openjdk repository\n - S8041561, PR3077: Inconsistent opacity behaviour between\n JCheckBox and JRadioButton\n - S8041592, PR3077: [TEST_BUG] Move 42 AWT hw/lw mixing tests\n to jdk\n - S8041915, PR3077: Move 8 awt tests to OpenJDK regression\n tests tree\n - S8043126, PR3077: move awt automated functional tests from\n AWT_Events/Lw and AWT_Events/AWT to OpenJDK repository\n - S8043131, PR3077: Move ShapedAndTranslucentWindows and GC\n functional AWT tests to regression tree\n - S8044157, PR3077: [TEST_BUG] Improve recently submitted\n AWT_Mixing tests\n - S8044172, PR3077: [TEST_BUG] Move regtests for 4523758 and\n AltPlusNumberKeyCombinationsTest to jdk\n - S8044429, PR3077: move awt automated tests for AWT_Modality\n to OpenJDK repository\n - S8044762, PR2960: com/sun/jdi/OptionTest.java test time out\n - S8044765, PR3077: Move functional tests\n AWT_SystemTray/Automated to openjdk repository\n - S8047180, PR3077: Move functional tests AWT_Headless/Automated\n to OpenJDK repository\n - S8047367, PR3077: move awt automated tests from AWT_Modality\n to OpenJDK repository - part 2\n - S8048246, PR3077: Move AWT_DnD/Clipboard/Automated functional\n tests to OpenJDK\n - S8049226, PR2960: com/sun/jdi/OptionTest.java test times out\n again\n - S8049617, PR3077: move awt automated tests from AWT_Modality\n to OpenJDK repository - part 3\n - S8049694, PR3077: Migrate functional\n AWT_DesktopProperties/Automated tests to OpenJDK\n - S8050885, PR3077: move awt automated tests from AWT_Modality\n to OpenJDK repository - part 4\n - S8051440, PR3077: move tests about maximizing undecorated to\n OpenJDK\n - S8052012, PR3077: move awt automated tests from AWT_Modality\n to OpenJDK repository - part 5\n - S8052408, PR3077: Move AWT_BAT functional tests to OpenJDK (3\n of 3)\n - S8053657, PR3077: [TEST_BUG] move some 5 tests related to\n undecorated Frame/JFrame to JDK\n - S8054143, PR3077: move awt automated tests from AWT_Modality\n to OpenJDK repository - part 6\n - S8054358, PR3077: move awt automated tests from AWT_Modality\n to OpenJDK repository - part 7\n - S8054359, PR3077: move awt automated tests from AWT_Modality\n to OpenJDK repository - part 8\n - S8055360, PR3077: Move the rest part of AWT\n ShapedAndTranslucent tests to OpenJDK\n - S8055664, PR3077: move 14 tests about setLocationRelativeTo\n to jdk\n - S8055836, PR3077: move awt tests from AWT_Modality to OpenJDK\n repository - part 9\n - S8056911, PR3077: Remove internal API usage from ExtendedRobot\n class\n - S8057694, PR3077: move awt tests from AWT_Modality to OpenJDK\n repository - part 10\n - S8058959, PR1061: closed/java/awt/event/ComponentEvent/MovedResizedTwiceTest/MovedResizedTwiceTest.java\n failed automatically\n - S8062606, PR3077: Fix a typo in java.awt.Robot class\n - S8063102, PR3077: Change open awt regression tests to avoid\n sun.awt.SunToolkit.realSync, part 1\n - S8063104, PR3077: Change open awt regression tests to avoid\n sun.awt.SunToolkit.realSync, part 2\n - S8063106, PR3077: Change open swing regression tests to avoid\n sun.awt.SunToolkit.realSync, part 1\n - S8063107, PR3077: Change open swing regression tests to avoid\n sun.awt.SunToolkit.realSync, part 2\n - S8064573, PR3077: [TEST_BUG] javax/swing/text/AbstractDocument/6968363/Test6968363.java\n is asocial pressing VK_LEFT and not releasing\n - S8064575, PR3077: [TEST_BUG] javax/swing/JEditorPane/6917744/bug6917744.java\n 100 times press keys and never releases\n - S8064809, PR3077: [TEST_BUG] javax/swing/JComboBox/4199622/bug4199622.java\n contains a lot of keyPress and not a single keyRelease\n - S8067441, PR3077: Some tests fails with error: cannot find symbol\n getSystemMnemonicKeyCodes()\n - S8068228, PR3077: Test closed/java/awt/Mouse/MaximizedFrameTest/MaximizedFrameTest\n fails with GTKLookAndFeel\n - S8069361, PR1061: SunGraphics2D.getDefaultTransform() does not\n include scale factor\n - S8073320, PR1061: Windows HiDPI Graphics support\n - S8074807, PR3077: Fix some tests unnecessary using internal API\n - S8076315, PR3077: move 4 manual functional swing tests to\n regression suite\n - S8078504, PR3094: Zero lacks declaration of\n VM_Version::initialize()\n - S8129822, PR3077: Define \u0027headful\u0027 jtreg keyword\n - S8132123, PR1061: MultiResolutionCachedImage unnecessarily\n creates base image to get its size\n - S8133539, PR1061: [TEST_BUG] Split\n java/awt/image/MultiResolutionImageTest.java in two to allow\n restricted access\n - S8137571, PR1061: Linux HiDPI Graphics support\n - S8142406, PR1061: [TEST] MultiResolution image: need test to\n cover the case when @2x image is corrupted\n - S8145188, PR2945: No LocalVariableTable generated for the\n entire JDK\n - S8150258, PR1061: [TEST] HiDPI: create a test for\n multiresolution menu items icons\n - S8150724, PR1061: [TEST] HiDPI: create a test for\n multiresolution icons\n - S8150844, PR1061: [hidpi] [macosx] -Dsun.java2d.uiScale should\n be taken into account for OS X\n - S8151841, PR2882: Build needs additional flags to compile with\n GCC 6 [plus parts of 8149647 \u0026 8032045]\n - S8155613, PR1061: [PIT] crash in\n AWT_Desktop/Automated/Exceptions/BasicTest\n - S8156020, PR1061: 8145547 breaks AIX and and uses RTLD_NOLOAD\n incorrectly\n - S8156128, PR1061: Tests for [AWT/Swing] Conditional support\n for GTK 3 on Linux\n - S8158260, PR2991, RH1341258: PPC64: unaligned Unsafe.getInt\n can lead to the generation of illegal instructions (bsc#988651)\n - S8159244, PR3074: Partially initialized string object created\n by C2\u0027s string concat optimization may escape\n - S8159690, PR3077: [TESTBUG] Mark headful tests with @key\n headful.\n - S8160294, PR2882, PR3095: Some client libraries cannot be\n built with GCC 6\n * Bug fixes\n - PR1958: GTKLookAndFeel does not honor\n gtk-alternative-button-order\n - PR2822: Feed LIBS \u0026 CFLAGS into configure rather than make to\n avoid re-discovery by OpenJDK configure\n - PR2932: Support ccache in a non-automagic manner\n - PR2933: Support ccache 3.2 and later\n - PR2964: Set system defaults based on OS\n - PR2974, RH1337583: PKCS#10 certificate requests now use CRLF\n line endings rather than system line endings\n - PR3078: Remove duplicated line dating back to 6788347 and\n 6894807\n - PR3083, RH1346460: Regression in SSL debug output without an\n ECC provider\n - PR3089: Remove old memory limits patch\n - PR3090, RH1204159: SystemTap is heavily confused by multiple\n JDKs\n - PR3095: Fix warnings in URLClassPath.c\n - PR3096: Remove dead --disable-optimizations option\n - PR3105: Use version from hotspot.map to create tarball filename\n - PR3106: Handle both correctly-spelt property\n \u0027enableCustomValueHandler\u0027 introduced by S8079718 and typo\n version\n - PR3108: Shenandoah patches not included in release tarball\n - PR3110: Update hotspot.map documentation in INSTALL\n * AArch64 port\n - S8145320, PR3078: Create unsafe_arraycopy and\n generic_arraycopy for AArch64\n - S8148328, PR3078: aarch64: redundant lsr instructions in stub\n code.\n - S8148783, PR3078: aarch64: SEGV running SpecJBB2013\n - S8148948, PR3078: aarch64: generate_copy_longs calls align()\n incorrectly\n - S8149080, PR3078: AArch64: Recognise disjoint array copy in\n stub code\n - S8149365, PR3078: aarch64: memory copy does not prefetch on\n backwards copy\n - S8149907, PR3078: aarch64: use load/store pair instructions\n in call_stub\n - S8150038, PR3078: aarch64: make use of CBZ and CBNZ when\n comparing narrow pointer with zero\n - S8150045, PR3078: arraycopy causes segfaults in SATB during\n garbage collection\n - S8150082, PR3078: aarch64: optimise small array copy\n - S8150229, PR3078: aarch64: pipeline class for several\n instructions is not set correctly\n - S8150313, PR3078: aarch64: optimise array copy using SIMD\n instructions\n - S8150394, PR3078: aarch64: add support for 8.1 LSE CAS\n instructions\n - S8151340, PR3078: aarch64: prefetch the destination word for\n write prior to ldxr/stxr loops.\n - S8151502, PR3078: optimize pd_disjoint_words and\n pd_conjoint_words\n - S8151775, PR3078: aarch64: add support for 8.1 LSE atomic\n operations\n - S8152537, PR3078: aarch64: Make use of CBZ and CBNZ when\n comparing unsigned values with zero.\n - S8152840, PR3078: aarch64: improve _unsafe_arraycopy stub\n routine\n - S8153713, PR3078: aarch64: improve short array clearing using\n store pair\n - S8153797, PR3078: aarch64: Add Arrays.fill stub code\n - S8154537, PR3078: AArch64: some integer rotate instructions\n are never emitted\n - S8154739, PR3078: AArch64: TemplateTable::fast_xaccess loads\n in wrong mode\n - S8155015, PR3078: Aarch64: bad assert in spill generation\n code\n - S8155100, PR3078: AArch64: Relax alignment requirement for\n byte_map_base\n - S8155612, PR3078: Aarch64: vector nodes need to support\n misaligned offset\n - S8155617, PR3078: aarch64: ClearArray does not use DC ZVA\n - S8155653, PR3078: TestVectorUnalignedOffset.java not pushed\n with 8155612\n - S8156731, PR3078: aarch64: java/util/Arrays/Correct.java fails\n due to _generic_arraycopy stub routine\n - S8157841, PR3078: aarch64: prefetch ignores cache line size\n - S8157906, PR3078: aarch64: some more integer rotate\n instructions are never emitted\n - S8158913, PR3078: aarch64: SEGV running Spark terasort\n - S8159052, PR3078: aarch64: optimise unaligned copies in\n pd_disjoint_words and pd_conjoint_words\n - S8159063, PR3078: aarch64: optimise unaligned array copy long\n - PR3078: Cleanup remaining differences from aarch64/jdk8u tree\n- Fix script linking /usr/share/javazi/tzdb.dat for platform where\n it applies (bsc#987895)\n\n- Fix aarch64 running with 48 bits va space (bsc#984684)\n\n avoid some crashes\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1187,SUSE-SLE-SERVER-12-SP1-2016-1187", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2012-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2012-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162012-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2012-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002198.html" }, { "category": "self", "summary": "SUSE Bug 984684", "url": "https://bugzilla.suse.com/984684" }, { "category": "self", "summary": "SUSE Bug 987895", "url": "https://bugzilla.suse.com/987895" }, { "category": "self", "summary": "SUSE Bug 988651", "url": "https://bugzilla.suse.com/988651" }, { "category": "self", "summary": "SUSE Bug 989721", "url": "https://bugzilla.suse.com/989721" }, { "category": "self", "summary": "SUSE Bug 989722", "url": "https://bugzilla.suse.com/989722" }, { "category": "self", "summary": "SUSE Bug 989723", "url": "https://bugzilla.suse.com/989723" }, { "category": "self", "summary": "SUSE Bug 989725", "url": "https://bugzilla.suse.com/989725" }, { "category": "self", "summary": "SUSE Bug 989726", "url": "https://bugzilla.suse.com/989726" }, { "category": "self", "summary": "SUSE Bug 989727", "url": "https://bugzilla.suse.com/989727" }, { "category": "self", "summary": "SUSE Bug 989728", "url": "https://bugzilla.suse.com/989728" }, { "category": "self", "summary": "SUSE Bug 989729", "url": "https://bugzilla.suse.com/989729" }, { "category": "self", "summary": "SUSE Bug 989730", "url": "https://bugzilla.suse.com/989730" }, { "category": "self", "summary": "SUSE Bug 989731", "url": "https://bugzilla.suse.com/989731" }, { "category": "self", "summary": "SUSE Bug 989732", "url": "https://bugzilla.suse.com/989732" }, { "category": "self", "summary": "SUSE Bug 989733", "url": "https://bugzilla.suse.com/989733" }, { "category": "self", "summary": "SUSE Bug 989734", "url": "https://bugzilla.suse.com/989734" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3458 page", "url": "https://www.suse.com/security/cve/CVE-2016-3458/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3485 page", "url": "https://www.suse.com/security/cve/CVE-2016-3485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3498 page", "url": "https://www.suse.com/security/cve/CVE-2016-3498/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3500 page", "url": "https://www.suse.com/security/cve/CVE-2016-3500/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3503 page", "url": "https://www.suse.com/security/cve/CVE-2016-3503/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3508 page", "url": "https://www.suse.com/security/cve/CVE-2016-3508/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3511 page", "url": "https://www.suse.com/security/cve/CVE-2016-3511/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3550 page", "url": "https://www.suse.com/security/cve/CVE-2016-3550/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3552 page", "url": "https://www.suse.com/security/cve/CVE-2016-3552/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3587 page", "url": "https://www.suse.com/security/cve/CVE-2016-3587/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3598 page", "url": "https://www.suse.com/security/cve/CVE-2016-3598/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3606 page", "url": "https://www.suse.com/security/cve/CVE-2016-3606/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3610 page", "url": "https://www.suse.com/security/cve/CVE-2016-3610/" } ], "title": "Security update for java-1_8_0-openjdk", "tracking": { "current_release_date": "2016-08-09T11:33:15Z", "generator": { "date": "2016-08-09T11:33:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2012-1", "initial_release_date": "2016-08-09T11:33:15Z", "revision_history": [ { "date": "2016-08-09T11:33:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "product": { "name": "java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "product_id": "java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "product_id": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "product_id": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "product_id": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "product": { "name": "java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "product_id": "java-1_8_0-openjdk-1.8.0.101-14.3.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "product_id": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "product_id": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "product_id": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.101-14.3.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.101-14.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.101-14.3.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.101-14.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.101-14.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.101-14.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3458" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; and Java SE Embedded 8u91 allows remote attackers to affect integrity via vectors related to CORBA.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3458", "url": "https://www.suse.com/security/cve/CVE-2016-3458" }, { "category": "external", "summary": "SUSE Bug 989732 for CVE-2016-3458", "url": "https://bugzilla.suse.com/989732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "moderate" } ], "title": "CVE-2016-3458" }, { "cve": "CVE-2016-3485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3485" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows local users to affect integrity via vectors related to Networking.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3485", "url": "https://www.suse.com/security/cve/CVE-2016-3485" }, { "category": "external", "summary": "SUSE Bug 1009280 for CVE-2016-3485", "url": "https://bugzilla.suse.com/1009280" }, { "category": "external", "summary": "SUSE Bug 989734 for CVE-2016-3485", "url": "https://bugzilla.suse.com/989734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "low" } ], "title": "CVE-2016-3485" }, { "cve": "CVE-2016-3498", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3498" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows remote attackers to affect availability via vectors related to JavaFX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3498", "url": "https://www.suse.com/security/cve/CVE-2016-3498" }, { "category": "external", "summary": "SUSE Bug 989729 for CVE-2016-3498", "url": "https://bugzilla.suse.com/989729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "moderate" } ], "title": "CVE-2016-3498" }, { "cve": "CVE-2016-3500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3500" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3508.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3500", "url": "https://www.suse.com/security/cve/CVE-2016-3500" }, { "category": "external", "summary": "SUSE Bug 989730 for CVE-2016-3500", "url": "https://bugzilla.suse.com/989730" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "moderate" } ], "title": "CVE-2016-3500" }, { "cve": "CVE-2016-3503", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3503" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3503", "url": "https://www.suse.com/security/cve/CVE-2016-3503" }, { "category": "external", "summary": "SUSE Bug 989728 for CVE-2016-3503", "url": "https://bugzilla.suse.com/989728" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "moderate" } ], "title": "CVE-2016-3503" }, { "cve": "CVE-2016-3508", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3508" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3500.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3508", "url": "https://www.suse.com/security/cve/CVE-2016-3508" }, { "category": "external", "summary": "SUSE Bug 989731 for CVE-2016-3508", "url": "https://bugzilla.suse.com/989731" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "moderate" } ], "title": "CVE-2016-3508" }, { "cve": "CVE-2016-3511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3511" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Deployment.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3511", "url": "https://www.suse.com/security/cve/CVE-2016-3511" }, { "category": "external", "summary": "SUSE Bug 1009280 for CVE-2016-3511", "url": "https://bugzilla.suse.com/1009280" }, { "category": "external", "summary": "SUSE Bug 989727 for CVE-2016-3511", "url": "https://bugzilla.suse.com/989727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "moderate" } ], "title": "CVE-2016-3511" }, { "cve": "CVE-2016-3550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3550" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality via vectors related to Hotspot.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3550", "url": "https://www.suse.com/security/cve/CVE-2016-3550" }, { "category": "external", "summary": "SUSE Bug 989733 for CVE-2016-3550", "url": "https://bugzilla.suse.com/989733" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "moderate" } ], "title": "CVE-2016-3550" }, { "cve": "CVE-2016-3552", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3552" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3552", "url": "https://www.suse.com/security/cve/CVE-2016-3552" }, { "category": "external", "summary": "SUSE Bug 989726 for CVE-2016-3552", "url": "https://bugzilla.suse.com/989726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "moderate" } ], "title": "CVE-2016-3552" }, { "cve": "CVE-2016-3587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3587" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3587", "url": "https://www.suse.com/security/cve/CVE-2016-3587" }, { "category": "external", "summary": "SUSE Bug 989721 for CVE-2016-3587", "url": "https://bugzilla.suse.com/989721" }, { "category": "external", "summary": "SUSE Bug 998845 for CVE-2016-3587", "url": "https://bugzilla.suse.com/998845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "important" } ], "title": "CVE-2016-3587" }, { "cve": "CVE-2016-3598", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3598" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3598", "url": "https://www.suse.com/security/cve/CVE-2016-3598" }, { "category": "external", "summary": "SUSE Bug 1009280 for CVE-2016-3598", "url": "https://bugzilla.suse.com/1009280" }, { "category": "external", "summary": "SUSE Bug 989723 for CVE-2016-3598", "url": "https://bugzilla.suse.com/989723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "important" } ], "title": "CVE-2016-3598" }, { "cve": "CVE-2016-3606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3606" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3606", "url": "https://www.suse.com/security/cve/CVE-2016-3606" }, { "category": "external", "summary": "SUSE Bug 989722 for CVE-2016-3606", "url": "https://bugzilla.suse.com/989722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "important" } ], "title": "CVE-2016-3606" }, { "cve": "CVE-2016-3610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3610" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3598.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3610", "url": "https://www.suse.com/security/cve/CVE-2016-3610" }, { "category": "external", "summary": "SUSE Bug 989725 for CVE-2016-3610", "url": "https://bugzilla.suse.com/989725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.101-14.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.101-14.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:33:15Z", "details": "important" } ], "title": "CVE-2016-3610" } ] }
rhsa-2016:1475
Vulnerability from csaf_redhat
Published
2016-07-21 10:19
Modified
2025-08-03 14:30
Summary
Red Hat Security Advisory: java-1.8.0-oracle security update
Notes
Topic
An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 6 and Oracle Java for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[Updated 12 September 2016]
This advisory has been updated to push packages into the Oracle Java for Red Hat Enterprise Linux 6 Compute Node channels. The packages included in this revised update have not been changed in any way from the packages included in the original advisory.
Details
Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.
This update upgrades Oracle Java SE 8 to version 8 Update 101.
Security Fix(es):
* This update fixes multiple vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. (CVE-2016-3458, CVE-2016-3498, CVE-2016-3500, CVE-2016-3503, CVE-2016-3508, CVE-2016-3511, CVE-2016-3550, CVE-2016-3552, CVE-2016-3587, CVE-2016-3598, CVE-2016-3606, CVE-2016-3610)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-oracle is now available for Oracle Java for Red Hat Enterprise Linux 6 and Oracle Java for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 12 September 2016]\nThis advisory has been updated to push packages into the Oracle Java for Red Hat Enterprise Linux 6 Compute Node channels. The packages included in this revised update have not been changed in any way from the packages included in the original advisory.", "title": "Topic" }, { "category": "general", "text": "Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.\n\nThis update upgrades Oracle Java SE 8 to version 8 Update 101.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. (CVE-2016-3458, CVE-2016-3498, CVE-2016-3500, CVE-2016-3503, CVE-2016-3508, CVE-2016-3511, CVE-2016-3550, CVE-2016-3552, CVE-2016-3587, CVE-2016-3598, CVE-2016-3606, CVE-2016-3610)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1475", "url": "https://access.redhat.com/errata/RHSA-2016:1475" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/java/javase/8u101-relnotes-3021761.html", "url": "http://www.oracle.com/technetwork/java/javase/8u101-relnotes-3021761.html" }, { "category": "external", "summary": "1356963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356963" }, { "category": "external", "summary": "1356971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356971" }, { "category": "external", "summary": "1356987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356987" }, { "category": "external", "summary": "1356994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356994" }, { "category": "external", "summary": "1357008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357008" }, { "category": "external", "summary": "1357015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357015" }, { "category": "external", "summary": "1357494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357494" }, { "category": "external", "summary": "1357506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357506" }, { "category": "external", "summary": "1358167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358167" }, { "category": "external", "summary": "1358168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358168" }, { "category": "external", "summary": "1358169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358169" }, { "category": "external", "summary": "1358170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358170" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1475.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-oracle security update", "tracking": { "current_release_date": "2025-08-03T14:30:02+00:00", "generator": { "date": "2025-08-03T14:30:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1475", "initial_release_date": "2016-07-21T10:19:52+00:00", "revision_history": [ { "date": "2016-07-21T10:19:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-12-14T16:39:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T14:30:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Desktop 6", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:6" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product": { "name": "Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:6" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Server 6", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:6" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Workstation 6", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:6" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.2.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:7" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.2.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:7" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.2.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:7" } } }, { "category": "product_name", "name": "Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.2.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_oracle_java:7" } } } ], "category": "product_family", "name": "Oracle Java for Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product_id": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.101-1jpp.1.el6_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product_id": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.101-1jpp.1.el6_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product_id": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.101-1jpp.1.el6_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product_id": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.101-1jpp.1.el6_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product_id": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.101-1jpp.1.el6_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product_id": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.101-1jpp.1.el6_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.101-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.101-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.101-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.101-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.101-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.101-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "product": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "product_id": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-src@1.8.0.101-1jpp.1.el6_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "product": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "product_id": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-plugin@1.8.0.101-1jpp.1.el6_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "product": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "product_id": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-devel@1.8.0.101-1jpp.1.el6_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "product": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "product_id": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-javafx@1.8.0.101-1jpp.1.el6_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "product": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "product_id": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1.8.0.101-1jpp.1.el6_8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "product": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "product_id": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-oracle-jdbc@1.8.0.101-1jpp.1.el6_8?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Client-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Client-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Client-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Client-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Client-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Client-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Client-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Client-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Client-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Client-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Client-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Desktop 6", "product_id": "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Client-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6ComputeNode-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6ComputeNode-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6ComputeNode-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6ComputeNode-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6ComputeNode-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6ComputeNode-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux HPC Node 6", "product_id": "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Server-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Server-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Server-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Server-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Server-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Server-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Server-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Server-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Server-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Server-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Server-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server 6", "product_id": "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Server-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Workstation-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Workstation-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Workstation-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Workstation-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Workstation-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Workstation-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Workstation-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Workstation-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Workstation-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Workstation-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "relates_to_product_reference": "6Workstation-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation 6", "product_id": "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "relates_to_product_reference": "6Workstation-OracleJava-6.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Compute Node (v. 7)", "product_id": "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-OracleJava-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64 as a component of Oracle Java for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-OracleJava-7.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3458", "discovery_date": "2016-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1357494" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; and Java SE Embedded 8u91 allows remote attackers to affect integrity via vectors related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient restrictions on the use of custom ValueHandler (CORBA, 8079718)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3458" }, { "category": "external", "summary": "RHBZ#1357494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357494" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3458", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3458" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" } ], "release_date": "2016-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-21T10:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1475" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient restrictions on the use of custom ValueHandler (CORBA, 8079718)" }, { "cve": "CVE-2016-3498", "discovery_date": "2016-07-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1358170" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows remote attackers to affect availability via vectors related to JavaFX.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u111 and 8u101 (JavaFX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3498" }, { "category": "external", "summary": "RHBZ#1358170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3498", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3498" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3498", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3498" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" } ], "release_date": "2016-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-21T10:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1475" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u111 and 8u101 (JavaFX)" }, { "cve": "CVE-2016-3500", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2016-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1357008" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3508.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: maximum XML name limit not applied to namespace URIs (JAXP, 8148872)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3500" }, { "category": "external", "summary": "RHBZ#1357008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357008" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3500", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3500" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" } ], "release_date": "2016-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-21T10:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1475" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: maximum XML name limit not applied to namespace URIs (JAXP, 8148872)" }, { "cve": "CVE-2016-3503", "discovery_date": "2016-07-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1358169" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u121, 7u111, and 8u101 (Install)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3503" }, { "category": "external", "summary": "RHBZ#1358169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3503", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3503" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" } ], "release_date": "2016-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-21T10:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1475" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u121, 7u111, and 8u101 (Install)" }, { "cve": "CVE-2016-3508", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2016-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1357015" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3500.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing entity replacement limits (JAXP, 8149962)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3508" }, { "category": "external", "summary": "RHBZ#1357015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3508", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3508" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" } ], "release_date": "2016-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-21T10:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1475" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: missing entity replacement limits (JAXP, 8149962)" }, { "cve": "CVE-2016-3511", "discovery_date": "2016-07-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1358168" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u111 and 8u101 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3511" }, { "category": "external", "summary": "RHBZ#1358168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3511", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3511" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" } ], "release_date": "2016-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-21T10:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1475" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u111 and 8u101 (Deployment)" }, { "cve": "CVE-2016-3550", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1357506" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality via vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer overflows in bytecode streams (Hotspot, 8152479)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3550" }, { "category": "external", "summary": "RHBZ#1357506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3550" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" } ], "release_date": "2016-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-21T10:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1475" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: integer overflows in bytecode streams (Hotspot, 8152479)" }, { "cve": "CVE-2016-3552", "discovery_date": "2016-07-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1358167" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 8u101 (Install)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3552" }, { "category": "external", "summary": "RHBZ#1358167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3552", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3552" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3552", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3552" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" } ], "release_date": "2016-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-21T10:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1475" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 8u101 (Install)" }, { "cve": "CVE-2016-3587", "discovery_date": "2016-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1356987" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient protection of MethodHandle.invokeBasic() (Hotspot, 8154475)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3587" }, { "category": "external", "summary": "RHBZ#1356987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356987" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3587", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3587" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3587", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3587" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" } ], "release_date": "2016-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-21T10:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1475" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient protection of MethodHandle.invokeBasic() (Hotspot, 8154475)" }, { "cve": "CVE-2016-3598", "discovery_date": "2016-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1356971" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incorrect handling of MethodHandles.dropArguments() argument (Libraries, 8155985)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3598" }, { "category": "external", "summary": "RHBZ#1356971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3598", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3598" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" } ], "release_date": "2016-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-21T10:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1475" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: incorrect handling of MethodHandles.dropArguments() argument (Libraries, 8155985)" }, { "cve": "CVE-2016-3606", "discovery_date": "2016-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1356963" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient bytecode verification (Hotspot, 8155981)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3606" }, { "category": "external", "summary": "RHBZ#1356963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3606", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3606" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3606", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3606" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" } ], "release_date": "2016-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-21T10:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1475" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient bytecode verification (Hotspot, 8155981)" }, { "cve": "CVE-2016-3610", "discovery_date": "2016-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1356994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3598.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient value count check in MethodHandles.filterReturnValue() (Libraries, 8158571)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3610" }, { "category": "external", "summary": "RHBZ#1356994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3610", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3610" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA" } ], "release_date": "2016-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-21T10:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Oracle Java must be restarted for this update to take effect.", "product_ids": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1475" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Client-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6ComputeNode-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Server-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el6_8.x86_64", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.i686", "6Workstation-OracleJava-6.8.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el6_8.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Client-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7ComputeNode-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Server-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-devel-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-javafx-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-jdbc-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-plugin-1:1.8.0.101-1jpp.1.el7.x86_64", "7Workstation-OracleJava-7.2.Z:java-1.8.0-oracle-src-1:1.8.0.101-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient value count check in MethodHandles.filterReturnValue() (Libraries, 8158571)" } ] }
fkie_cve-2016-3552
Vulnerability from fkie_nvd
Published
2016-07-21 10:13
Modified
2025-04-12 10:46
Severity ?
Summary
Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
References
▶ | URL | Tags | |
---|---|---|---|
secalert_us@oracle.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html | ||
secalert_us@oracle.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html | ||
secalert_us@oracle.com | http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html | ||
secalert_us@oracle.com | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | Patch, Vendor Advisory | |
secalert_us@oracle.com | http://www.securityfocus.com/bid/91787 | Third Party Advisory, VDB Entry | |
secalert_us@oracle.com | http://www.securityfocus.com/bid/92000 | ||
secalert_us@oracle.com | http://www.securitytracker.com/id/1036365 | ||
secalert_us@oracle.com | https://access.redhat.com/errata/RHSA-2016:1475 | ||
secalert_us@oracle.com | https://security.gentoo.org/glsa/201610-08 | ||
secalert_us@oracle.com | https://security.netapp.com/advisory/ntap-20160721-0001/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91787 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92000 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036365 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2016:1475 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201610-08 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20160721-0001/ |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*", "matchCriteriaId": "95C17CAA-0971-44CB-8A04-F135ACBEFBF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*", "matchCriteriaId": "CFC93807-F81D-4F4C-AD4F-3F0A45C36F34", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install." }, { "lang": "es", "value": "Vulnerabilidad en Oracle Java SE 8u92 permite usuarios locales afectar la confidencialidad, la integridad y la disponibilidad a trav\u00e9s de vectores relacionados con Install." } ], "id": "CVE-2016-3552", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.4, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-21T10:13:49.233", "references": [ { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" }, { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" }, { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/bid/92000" }, { "source": "secalert_us@oracle.com", "url": "http://www.securitytracker.com/id/1036365" }, { "source": "secalert_us@oracle.com", "url": "https://access.redhat.com/errata/RHSA-2016:1475" }, { "source": "secalert_us@oracle.com", "url": "https://security.gentoo.org/glsa/201610-08" }, { "source": "secalert_us@oracle.com", "url": "https://security.netapp.com/advisory/ntap-20160721-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/92000" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2016:1475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-08" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20160721-0001/" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2024:10197-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
java-1_8_0-openjdk-1.8.0.111-1.1 on GA media
Notes
Title of the patch
java-1_8_0-openjdk-1.8.0.111-1.1 on GA media
Description of the patch
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.111-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10197
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-1_8_0-openjdk-1.8.0.111-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.111-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10197", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10197-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2590 page", "url": "https://www.suse.com/security/cve/CVE-2015-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2597 page", "url": "https://www.suse.com/security/cve/CVE-2015-2597/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2601 page", "url": "https://www.suse.com/security/cve/CVE-2015-2601/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2613 page", "url": "https://www.suse.com/security/cve/CVE-2015-2613/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2619 page", "url": "https://www.suse.com/security/cve/CVE-2015-2619/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2621 page", "url": "https://www.suse.com/security/cve/CVE-2015-2621/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2625 page", "url": "https://www.suse.com/security/cve/CVE-2015-2625/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2627 page", "url": "https://www.suse.com/security/cve/CVE-2015-2627/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2628 page", "url": "https://www.suse.com/security/cve/CVE-2015-2628/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2632 page", "url": "https://www.suse.com/security/cve/CVE-2015-2632/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2637 page", "url": "https://www.suse.com/security/cve/CVE-2015-2637/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2638 page", "url": "https://www.suse.com/security/cve/CVE-2015-2638/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2659 page", "url": "https://www.suse.com/security/cve/CVE-2015-2659/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2664 page", "url": "https://www.suse.com/security/cve/CVE-2015-2664/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2808 page", "url": "https://www.suse.com/security/cve/CVE-2015-2808/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4000 page", "url": "https://www.suse.com/security/cve/CVE-2015-4000/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4729 page", "url": "https://www.suse.com/security/cve/CVE-2015-4729/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4731 page", "url": "https://www.suse.com/security/cve/CVE-2015-4731/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4732 page", "url": "https://www.suse.com/security/cve/CVE-2015-4732/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4733 page", "url": "https://www.suse.com/security/cve/CVE-2015-4733/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4734 page", "url": "https://www.suse.com/security/cve/CVE-2015-4734/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4736 page", "url": "https://www.suse.com/security/cve/CVE-2015-4736/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4748 page", "url": "https://www.suse.com/security/cve/CVE-2015-4748/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4749 page", "url": "https://www.suse.com/security/cve/CVE-2015-4749/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4760 page", "url": "https://www.suse.com/security/cve/CVE-2015-4760/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4803 page", "url": "https://www.suse.com/security/cve/CVE-2015-4803/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4805 page", "url": "https://www.suse.com/security/cve/CVE-2015-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4806 page", "url": "https://www.suse.com/security/cve/CVE-2015-4806/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4810 page", "url": "https://www.suse.com/security/cve/CVE-2015-4810/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4835 page", "url": "https://www.suse.com/security/cve/CVE-2015-4835/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4840 page", "url": "https://www.suse.com/security/cve/CVE-2015-4840/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4842 page", "url": "https://www.suse.com/security/cve/CVE-2015-4842/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4843 page", "url": "https://www.suse.com/security/cve/CVE-2015-4843/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4844 page", "url": "https://www.suse.com/security/cve/CVE-2015-4844/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4860 page", "url": "https://www.suse.com/security/cve/CVE-2015-4860/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4868 page", "url": "https://www.suse.com/security/cve/CVE-2015-4868/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4872 page", "url": "https://www.suse.com/security/cve/CVE-2015-4872/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4881 page", "url": "https://www.suse.com/security/cve/CVE-2015-4881/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4882 page", "url": "https://www.suse.com/security/cve/CVE-2015-4882/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4883 page", "url": "https://www.suse.com/security/cve/CVE-2015-4883/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4893 page", "url": "https://www.suse.com/security/cve/CVE-2015-4893/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4901 page", "url": "https://www.suse.com/security/cve/CVE-2015-4901/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4902 page", "url": "https://www.suse.com/security/cve/CVE-2015-4902/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4903 page", "url": "https://www.suse.com/security/cve/CVE-2015-4903/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4906 page", "url": "https://www.suse.com/security/cve/CVE-2015-4906/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4908 page", "url": "https://www.suse.com/security/cve/CVE-2015-4908/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4911 page", "url": "https://www.suse.com/security/cve/CVE-2015-4911/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4916 page", "url": "https://www.suse.com/security/cve/CVE-2015-4916/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7575 page", "url": "https://www.suse.com/security/cve/CVE-2015-7575/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8126 page", "url": "https://www.suse.com/security/cve/CVE-2015-8126/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0402 page", "url": "https://www.suse.com/security/cve/CVE-2016-0402/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0448 page", "url": "https://www.suse.com/security/cve/CVE-2016-0448/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0466 page", "url": "https://www.suse.com/security/cve/CVE-2016-0466/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0475 page", "url": "https://www.suse.com/security/cve/CVE-2016-0475/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0483 page", "url": "https://www.suse.com/security/cve/CVE-2016-0483/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0494 page", "url": "https://www.suse.com/security/cve/CVE-2016-0494/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0636 page", "url": "https://www.suse.com/security/cve/CVE-2016-0636/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0686 page", "url": "https://www.suse.com/security/cve/CVE-2016-0686/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0687 page", "url": "https://www.suse.com/security/cve/CVE-2016-0687/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0695 page", "url": "https://www.suse.com/security/cve/CVE-2016-0695/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3425 page", "url": "https://www.suse.com/security/cve/CVE-2016-3425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3426 page", "url": "https://www.suse.com/security/cve/CVE-2016-3426/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3427 page", "url": "https://www.suse.com/security/cve/CVE-2016-3427/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3458 page", "url": "https://www.suse.com/security/cve/CVE-2016-3458/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3485 page", "url": "https://www.suse.com/security/cve/CVE-2016-3485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3498 page", "url": "https://www.suse.com/security/cve/CVE-2016-3498/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3500 page", "url": "https://www.suse.com/security/cve/CVE-2016-3500/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3503 page", "url": "https://www.suse.com/security/cve/CVE-2016-3503/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3508 page", "url": "https://www.suse.com/security/cve/CVE-2016-3508/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3511 page", "url": "https://www.suse.com/security/cve/CVE-2016-3511/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3550 page", "url": "https://www.suse.com/security/cve/CVE-2016-3550/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3552 page", "url": "https://www.suse.com/security/cve/CVE-2016-3552/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3587 page", "url": "https://www.suse.com/security/cve/CVE-2016-3587/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3598 page", "url": "https://www.suse.com/security/cve/CVE-2016-3598/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3606 page", "url": "https://www.suse.com/security/cve/CVE-2016-3606/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3610 page", "url": "https://www.suse.com/security/cve/CVE-2016-3610/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5542 page", "url": "https://www.suse.com/security/cve/CVE-2016-5542/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5554 page", "url": "https://www.suse.com/security/cve/CVE-2016-5554/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5556 page", "url": "https://www.suse.com/security/cve/CVE-2016-5556/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5568 page", "url": "https://www.suse.com/security/cve/CVE-2016-5568/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5573 page", "url": "https://www.suse.com/security/cve/CVE-2016-5573/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5582 page", "url": "https://www.suse.com/security/cve/CVE-2016-5582/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5597 page", "url": "https://www.suse.com/security/cve/CVE-2016-5597/" } ], "title": "java-1_8_0-openjdk-1.8.0.111-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10197-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "product_id": "java-1_8_0-openjdk-1.8.0.111-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "product_id": "java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "product_id": "java-1_8_0-openjdk-1.8.0.111-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "product_id": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "product_id": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "product_id": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "product_id": "java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.111-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.111-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.111-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.111-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2590" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2590", "url": "https://www.suse.com/security/cve/CVE-2015-2590" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2590", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2590", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-2590", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2590" }, { "cve": "CVE-2015-2597", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2597" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Install.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2597", "url": "https://www.suse.com/security/cve/CVE-2015-2597" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2597", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2597", "url": "https://bugzilla.suse.com/938248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2597" }, { "cve": "CVE-2015-2601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2601" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2601", "url": "https://www.suse.com/security/cve/CVE-2015-2601" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2601", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2601", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-2601", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2601" }, { "cve": "CVE-2015-2613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2613" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2613", "url": "https://www.suse.com/security/cve/CVE-2015-2613" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2613", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2613", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-2613", "url": "https://bugzilla.suse.com/938895" }, { "category": "external", "summary": "SUSE Bug 951727 for CVE-2015-2613", "url": "https://bugzilla.suse.com/951727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2613" }, { "cve": "CVE-2015-2619", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2619" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2619", "url": "https://www.suse.com/security/cve/CVE-2015-2619" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2619", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2619", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-2619", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2619" }, { "cve": "CVE-2015-2621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2621" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allows remote attackers to affect confidentiality via vectors related to JMX.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2621", "url": "https://www.suse.com/security/cve/CVE-2015-2621" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2621", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2621", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-2621", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2621" }, { "cve": "CVE-2015-2625", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2625" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JSSE.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2625", "url": "https://www.suse.com/security/cve/CVE-2015-2625" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2625", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2625", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-2625", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2625" }, { "cve": "CVE-2015-2627", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2627" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to installation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2627", "url": "https://www.suse.com/security/cve/CVE-2015-2627" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2627", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2627", "url": "https://bugzilla.suse.com/938248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2627" }, { "cve": "CVE-2015-2628", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2628" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2628", "url": "https://www.suse.com/security/cve/CVE-2015-2628" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2628", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2628", "url": "https://bugzilla.suse.com/938248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2628" }, { "cve": "CVE-2015-2632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2632" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to 2D.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2632", "url": "https://www.suse.com/security/cve/CVE-2015-2632" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2632", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2632", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-2632", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2632" }, { "cve": "CVE-2015-2637", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2637" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2637", "url": "https://www.suse.com/security/cve/CVE-2015-2637" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2637", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2637", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-2637", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2637" }, { "cve": "CVE-2015-2638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2638" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2638", "url": "https://www.suse.com/security/cve/CVE-2015-2638" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2638", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2638", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-2638", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2638" }, { "cve": "CVE-2015-2659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2659" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u45 and Java SE Embedded 8u33 allows remote attackers to affect availability via unknown vectors related to Security.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2659", "url": "https://www.suse.com/security/cve/CVE-2015-2659" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2659", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2659", "url": "https://bugzilla.suse.com/938248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2659" }, { "cve": "CVE-2015-2664", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2664" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2664", "url": "https://www.suse.com/security/cve/CVE-2015-2664" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-2664", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2664", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-2664", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2664" }, { "cve": "CVE-2015-2808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2808" } ], "notes": [ { "category": "general", "text": "The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2808", "url": "https://www.suse.com/security/cve/CVE-2015-2808" }, { "category": "external", "summary": "SUSE Bug 925378 for CVE-2015-2808", "url": "https://bugzilla.suse.com/925378" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-2808", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-2808", "url": "https://bugzilla.suse.com/938895" }, { "category": "external", "summary": "SUSE Bug 952088 for CVE-2015-2808", "url": "https://bugzilla.suse.com/952088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2808" }, { "cve": "CVE-2015-4000", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4000" } ], "notes": [ { "category": "general", "text": "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4000", "url": "https://www.suse.com/security/cve/CVE-2015-4000" }, { "category": "external", "summary": "SUSE Bug 1074631 for CVE-2015-4000", "url": "https://bugzilla.suse.com/1074631" }, { "category": "external", "summary": "SUSE Bug 1211968 for CVE-2015-4000", "url": "https://bugzilla.suse.com/1211968" }, { "category": "external", "summary": "SUSE Bug 931600 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931600" }, { "category": "external", "summary": "SUSE Bug 931698 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931698" }, { "category": "external", "summary": "SUSE Bug 931723 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931723" }, { "category": "external", "summary": "SUSE Bug 931845 for CVE-2015-4000", "url": "https://bugzilla.suse.com/931845" }, { "category": "external", "summary": "SUSE Bug 932026 for CVE-2015-4000", "url": "https://bugzilla.suse.com/932026" }, { "category": "external", "summary": "SUSE Bug 932483 for CVE-2015-4000", "url": "https://bugzilla.suse.com/932483" }, { "category": "external", "summary": "SUSE Bug 934789 for CVE-2015-4000", "url": "https://bugzilla.suse.com/934789" }, { "category": "external", "summary": "SUSE Bug 935033 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935033" }, { "category": "external", "summary": "SUSE Bug 935540 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935540" }, { "category": "external", "summary": "SUSE Bug 935979 for CVE-2015-4000", "url": "https://bugzilla.suse.com/935979" }, { "category": "external", "summary": "SUSE Bug 937202 for CVE-2015-4000", "url": "https://bugzilla.suse.com/937202" }, { "category": "external", "summary": "SUSE Bug 937766 for CVE-2015-4000", "url": "https://bugzilla.suse.com/937766" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938432 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938432" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938895" }, { "category": "external", "summary": "SUSE Bug 938905 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938905" }, { "category": "external", "summary": "SUSE Bug 938906 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938906" }, { "category": "external", "summary": "SUSE Bug 938913 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938913" }, { "category": "external", "summary": "SUSE Bug 938945 for CVE-2015-4000", "url": "https://bugzilla.suse.com/938945" }, { "category": "external", "summary": "SUSE Bug 943664 for CVE-2015-4000", "url": "https://bugzilla.suse.com/943664" }, { "category": "external", "summary": "SUSE Bug 944729 for CVE-2015-4000", "url": "https://bugzilla.suse.com/944729" }, { "category": "external", "summary": "SUSE Bug 945582 for CVE-2015-4000", "url": "https://bugzilla.suse.com/945582" }, { "category": "external", "summary": "SUSE Bug 955589 for CVE-2015-4000", "url": "https://bugzilla.suse.com/955589" }, { "category": "external", "summary": "SUSE Bug 980406 for CVE-2015-4000", "url": "https://bugzilla.suse.com/980406" }, { "category": "external", "summary": "SUSE Bug 990592 for CVE-2015-4000", "url": "https://bugzilla.suse.com/990592" }, { "category": "external", "summary": "SUSE Bug 994144 for CVE-2015-4000", "url": "https://bugzilla.suse.com/994144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-4000" }, { "cve": "CVE-2015-4729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4729" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4729", "url": "https://www.suse.com/security/cve/CVE-2015-4729" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-4729", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4729", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-4729", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-4729" }, { "cve": "CVE-2015-4731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4731" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4731", "url": "https://www.suse.com/security/cve/CVE-2015-4731" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-4731", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4731", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-4731", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-4731" }, { "cve": "CVE-2015-4732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4732" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4732", "url": "https://www.suse.com/security/cve/CVE-2015-4732" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-4732", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4732", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-4732", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-4732" }, { "cve": "CVE-2015-4733", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4733" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4733", "url": "https://www.suse.com/security/cve/CVE-2015-4733" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-4733", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4733", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-4733", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-4733" }, { "cve": "CVE-2015-4734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4734" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4734", "url": "https://www.suse.com/security/cve/CVE-2015-4734" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4734", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4734", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4734" }, { "cve": "CVE-2015-4736", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4736" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4736", "url": "https://www.suse.com/security/cve/CVE-2015-4736" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-4736", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4736", "url": "https://bugzilla.suse.com/938248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-4736" }, { "cve": "CVE-2015-4748", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4748" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4748", "url": "https://www.suse.com/security/cve/CVE-2015-4748" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-4748", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4748", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-4748", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-4748" }, { "cve": "CVE-2015-4749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4749" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect availability via vectors related to JNDI.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4749", "url": "https://www.suse.com/security/cve/CVE-2015-4749" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-4749", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4749", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-4749", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-4749" }, { "cve": "CVE-2015-4760", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4760" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4760", "url": "https://www.suse.com/security/cve/CVE-2015-4760" }, { "category": "external", "summary": "SUSE Bug 937828 for CVE-2015-4760", "url": "https://bugzilla.suse.com/937828" }, { "category": "external", "summary": "SUSE Bug 938248 for CVE-2015-4760", "url": "https://bugzilla.suse.com/938248" }, { "category": "external", "summary": "SUSE Bug 938895 for CVE-2015-4760", "url": "https://bugzilla.suse.com/938895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-4760" }, { "cve": "CVE-2015-4803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4803" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4803", "url": "https://www.suse.com/security/cve/CVE-2015-4803" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4803", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4803", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4803" }, { "cve": "CVE-2015-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4805" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4805", "url": "https://www.suse.com/security/cve/CVE-2015-4805" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4805", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4805", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4805" }, { "cve": "CVE-2015-4806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4806" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4806", "url": "https://www.suse.com/security/cve/CVE-2015-4806" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4806", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4806", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4806" }, { "cve": "CVE-2015-4810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4810" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u85 and 8u60 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4810", "url": "https://www.suse.com/security/cve/CVE-2015-4810" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4810", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4810", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-4810" }, { "cve": "CVE-2015-4835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4835" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4835", "url": "https://www.suse.com/security/cve/CVE-2015-4835" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4835", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4835", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4835" }, { "cve": "CVE-2015-4840", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4840" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via unknown vectors related to 2D.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4840", "url": "https://www.suse.com/security/cve/CVE-2015-4840" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4840", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4840", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4840" }, { "cve": "CVE-2015-4842", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4842" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JAXP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4842", "url": "https://www.suse.com/security/cve/CVE-2015-4842" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4842", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4842", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4842" }, { "cve": "CVE-2015-4843", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4843" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4843", "url": "https://www.suse.com/security/cve/CVE-2015-4843" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4843", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4843", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4843" }, { "cve": "CVE-2015-4844", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4844" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4844", "url": "https://www.suse.com/security/cve/CVE-2015-4844" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4844", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4844", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4844" }, { "cve": "CVE-2015-4860", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4860" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4860", "url": "https://www.suse.com/security/cve/CVE-2015-4860" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4860", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4860", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4860" }, { "cve": "CVE-2015-4868", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4868" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u60 and Java SE Embedded 8u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4868", "url": "https://www.suse.com/security/cve/CVE-2015-4868" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4868", "url": "https://bugzilla.suse.com/951376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-4868" }, { "cve": "CVE-2015-4872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4872" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect integrity via unknown vectors related to Security.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4872", "url": "https://www.suse.com/security/cve/CVE-2015-4872" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4872", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4872", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4872" }, { "cve": "CVE-2015-4881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4881" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4835.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4881", "url": "https://www.suse.com/security/cve/CVE-2015-4881" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4881", "url": "https://bugzilla.suse.com/951376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-4881" }, { "cve": "CVE-2015-4882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4882" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect availability via vectors related to CORBA.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4882", "url": "https://www.suse.com/security/cve/CVE-2015-4882" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4882", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4882", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4882" }, { "cve": "CVE-2015-4883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4883" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4883", "url": "https://www.suse.com/security/cve/CVE-2015-4883" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4883", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4883", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4883" }, { "cve": "CVE-2015-4893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4893" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4893", "url": "https://www.suse.com/security/cve/CVE-2015-4893" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4893", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4893", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4893" }, { "cve": "CVE-2015-4901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4901" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u60 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4901", "url": "https://www.suse.com/security/cve/CVE-2015-4901" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4901", "url": "https://bugzilla.suse.com/951376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-4901" }, { "cve": "CVE-2015-4902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4902" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60 allows remote attackers to affect integrity via unknown vectors related to Deployment.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4902", "url": "https://www.suse.com/security/cve/CVE-2015-4902" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4902", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4902", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-4902" }, { "cve": "CVE-2015-4903", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4903" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to RMI.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4903", "url": "https://www.suse.com/security/cve/CVE-2015-4903" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4903", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4903", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4903" }, { "cve": "CVE-2015-4906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4906" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors related to JavaFX, a different vulnerability than CVE-2015-4908 and CVE-2015-4916.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4906", "url": "https://www.suse.com/security/cve/CVE-2015-4906" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4906", "url": "https://bugzilla.suse.com/951376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-4906" }, { "cve": "CVE-2015-4908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4908" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2015-4906 and CVE-2015-4916.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4908", "url": "https://www.suse.com/security/cve/CVE-2015-4908" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4908", "url": "https://bugzilla.suse.com/951376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-4908" }, { "cve": "CVE-2015-4911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4911" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4911", "url": "https://www.suse.com/security/cve/CVE-2015-4911" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4911", "url": "https://bugzilla.suse.com/951376" }, { "category": "external", "summary": "SUSE Bug 955131 for CVE-2015-4911", "url": "https://bugzilla.suse.com/955131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-4911" }, { "cve": "CVE-2015-4916", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4916" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2015-4906 and CVE-2015-4908.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4916", "url": "https://www.suse.com/security/cve/CVE-2015-4916" }, { "category": "external", "summary": "SUSE Bug 951376 for CVE-2015-4916", "url": "https://bugzilla.suse.com/951376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-4916" }, { "cve": "CVE-2015-7575", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7575" } ], "notes": [ { "category": "general", "text": "Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7575", "url": "https://www.suse.com/security/cve/CVE-2015-7575" }, { "category": "external", "summary": "SUSE Bug 959888 for CVE-2015-7575", "url": "https://bugzilla.suse.com/959888" }, { "category": "external", "summary": "SUSE Bug 960402 for CVE-2015-7575", "url": "https://bugzilla.suse.com/960402" }, { "category": "external", "summary": "SUSE Bug 960996 for CVE-2015-7575", "url": "https://bugzilla.suse.com/960996" }, { "category": "external", "summary": "SUSE Bug 961280 for CVE-2015-7575", "url": "https://bugzilla.suse.com/961280" }, { "category": "external", "summary": "SUSE Bug 961281 for CVE-2015-7575", "url": "https://bugzilla.suse.com/961281" }, { "category": "external", "summary": "SUSE Bug 961282 for CVE-2015-7575", "url": "https://bugzilla.suse.com/961282" }, { "category": "external", "summary": "SUSE Bug 961283 for CVE-2015-7575", "url": "https://bugzilla.suse.com/961283" }, { "category": "external", "summary": "SUSE Bug 961284 for CVE-2015-7575", "url": "https://bugzilla.suse.com/961284" }, { "category": "external", "summary": "SUSE Bug 961290 for CVE-2015-7575", "url": "https://bugzilla.suse.com/961290" }, { "category": "external", "summary": "SUSE Bug 961357 for CVE-2015-7575", "url": "https://bugzilla.suse.com/961357" }, { "category": "external", "summary": "SUSE Bug 962743 for CVE-2015-7575", "url": "https://bugzilla.suse.com/962743" }, { "category": "external", "summary": "SUSE Bug 963937 for CVE-2015-7575", "url": "https://bugzilla.suse.com/963937" }, { "category": "external", "summary": "SUSE Bug 967521 for CVE-2015-7575", "url": "https://bugzilla.suse.com/967521" }, { "category": "external", "summary": "SUSE Bug 981087 for CVE-2015-7575", "url": "https://bugzilla.suse.com/981087" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7575" }, { "cve": "CVE-2015-8126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8126" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8126", "url": "https://www.suse.com/security/cve/CVE-2015-8126" }, { "category": "external", "summary": "SUSE Bug 954980 for CVE-2015-8126", "url": "https://bugzilla.suse.com/954980" }, { "category": "external", "summary": "SUSE Bug 958198 for CVE-2015-8126", "url": "https://bugzilla.suse.com/958198" }, { "category": "external", "summary": "SUSE Bug 960402 for CVE-2015-8126", "url": "https://bugzilla.suse.com/960402" }, { "category": "external", "summary": "SUSE Bug 962743 for CVE-2015-8126", "url": "https://bugzilla.suse.com/962743" }, { "category": "external", "summary": "SUSE Bug 963937 for CVE-2015-8126", "url": "https://bugzilla.suse.com/963937" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2015-8126", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8126" }, { "cve": "CVE-2016-0402", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0402" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect integrity via unknown vectors related to Networking.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0402", "url": "https://www.suse.com/security/cve/CVE-2016-0402" }, { "category": "external", "summary": "SUSE Bug 960402 for CVE-2016-0402", "url": "https://bugzilla.suse.com/960402" }, { "category": "external", "summary": "SUSE Bug 962743 for CVE-2016-0402", "url": "https://bugzilla.suse.com/962743" }, { "category": "external", "summary": "SUSE Bug 963937 for CVE-2016-0402", "url": "https://bugzilla.suse.com/963937" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0402" }, { "cve": "CVE-2016-0448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0448" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0448", "url": "https://www.suse.com/security/cve/CVE-2016-0448" }, { "category": "external", "summary": "SUSE Bug 960402 for CVE-2016-0448", "url": "https://bugzilla.suse.com/960402" }, { "category": "external", "summary": "SUSE Bug 962743 for CVE-2016-0448", "url": "https://bugzilla.suse.com/962743" }, { "category": "external", "summary": "SUSE Bug 963937 for CVE-2016-0448", "url": "https://bugzilla.suse.com/963937" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0448" }, { "cve": "CVE-2016-0466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0466" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect availability via vectors related to JAXP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0466", "url": "https://www.suse.com/security/cve/CVE-2016-0466" }, { "category": "external", "summary": "SUSE Bug 960402 for CVE-2016-0466", "url": "https://bugzilla.suse.com/960402" }, { "category": "external", "summary": "SUSE Bug 962743 for CVE-2016-0466", "url": "https://bugzilla.suse.com/962743" }, { "category": "external", "summary": "SUSE Bug 963937 for CVE-2016-0466", "url": "https://bugzilla.suse.com/963937" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0466" }, { "cve": "CVE-2016-0475", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0475" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0475", "url": "https://www.suse.com/security/cve/CVE-2016-0475" }, { "category": "external", "summary": "SUSE Bug 962743 for CVE-2016-0475", "url": "https://bugzilla.suse.com/962743" }, { "category": "external", "summary": "SUSE Bug 963937 for CVE-2016-0475", "url": "https://bugzilla.suse.com/963937" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0475" }, { "cve": "CVE-2016-0483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0483" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote attackers to execute arbitrary code via crafted image data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0483", "url": "https://www.suse.com/security/cve/CVE-2016-0483" }, { "category": "external", "summary": "SUSE Bug 960402 for CVE-2016-0483", "url": "https://bugzilla.suse.com/960402" }, { "category": "external", "summary": "SUSE Bug 962743 for CVE-2016-0483", "url": "https://bugzilla.suse.com/962743" }, { "category": "external", "summary": "SUSE Bug 963937 for CVE-2016-0483", "url": "https://bugzilla.suse.com/963937" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0483" }, { "cve": "CVE-2016-0494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0494" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0494", "url": "https://www.suse.com/security/cve/CVE-2016-0494" }, { "category": "external", "summary": "SUSE Bug 962743 for CVE-2016-0494", "url": "https://bugzilla.suse.com/962743" }, { "category": "external", "summary": "SUSE Bug 963937 for CVE-2016-0494", "url": "https://bugzilla.suse.com/963937" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0494" }, { "cve": "CVE-2016-0636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0636" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u97, 8u73, and 8u74 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to the Hotspot sub-component.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0636", "url": "https://www.suse.com/security/cve/CVE-2016-0636" }, { "category": "external", "summary": "SUSE Bug 972468 for CVE-2016-0636", "url": "https://bugzilla.suse.com/972468" }, { "category": "external", "summary": "SUSE Bug 979252 for CVE-2016-0636", "url": "https://bugzilla.suse.com/979252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-0636" }, { "cve": "CVE-2016-0686", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0686" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Serialization.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0686", "url": "https://www.suse.com/security/cve/CVE-2016-0686" }, { "category": "external", "summary": "SUSE Bug 976340 for CVE-2016-0686", "url": "https://bugzilla.suse.com/976340" }, { "category": "external", "summary": "SUSE Bug 979252 for CVE-2016-0686", "url": "https://bugzilla.suse.com/979252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0686" }, { "cve": "CVE-2016-0687", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0687" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the Hotspot sub-component.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0687", "url": "https://www.suse.com/security/cve/CVE-2016-0687" }, { "category": "external", "summary": "SUSE Bug 976340 for CVE-2016-0687", "url": "https://bugzilla.suse.com/976340" }, { "category": "external", "summary": "SUSE Bug 979252 for CVE-2016-0687", "url": "https://bugzilla.suse.com/979252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0687" }, { "cve": "CVE-2016-0695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0695" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality via vectors related to Security.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0695", "url": "https://www.suse.com/security/cve/CVE-2016-0695" }, { "category": "external", "summary": "SUSE Bug 976340 for CVE-2016-0695", "url": "https://bugzilla.suse.com/976340" }, { "category": "external", "summary": "SUSE Bug 979252 for CVE-2016-0695", "url": "https://bugzilla.suse.com/979252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0695" }, { "cve": "CVE-2016-3425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3425" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect availability via vectors related to JAXP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3425", "url": "https://www.suse.com/security/cve/CVE-2016-3425" }, { "category": "external", "summary": "SUSE Bug 976340 for CVE-2016-3425", "url": "https://bugzilla.suse.com/976340" }, { "category": "external", "summary": "SUSE Bug 979252 for CVE-2016-3425", "url": "https://bugzilla.suse.com/979252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-3425" }, { "cve": "CVE-2016-3426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3426" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality via vectors related to JCE.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3426", "url": "https://www.suse.com/security/cve/CVE-2016-3426" }, { "category": "external", "summary": "SUSE Bug 976340 for CVE-2016-3426", "url": "https://bugzilla.suse.com/976340" }, { "category": "external", "summary": "SUSE Bug 979252 for CVE-2016-3426", "url": "https://bugzilla.suse.com/979252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-3426" }, { "cve": "CVE-2016-3427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3427" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3427", "url": "https://www.suse.com/security/cve/CVE-2016-3427" }, { "category": "external", "summary": "SUSE Bug 1011805 for CVE-2016-3427", "url": "https://bugzilla.suse.com/1011805" }, { "category": "external", "summary": "SUSE Bug 976340 for CVE-2016-3427", "url": "https://bugzilla.suse.com/976340" }, { "category": "external", "summary": "SUSE Bug 979252 for CVE-2016-3427", "url": "https://bugzilla.suse.com/979252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-3427" }, { "cve": "CVE-2016-3458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3458" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; and Java SE Embedded 8u91 allows remote attackers to affect integrity via vectors related to CORBA.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3458", "url": "https://www.suse.com/security/cve/CVE-2016-3458" }, { "category": "external", "summary": "SUSE Bug 989732 for CVE-2016-3458", "url": "https://bugzilla.suse.com/989732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3458" }, { "cve": "CVE-2016-3485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3485" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows local users to affect integrity via vectors related to Networking.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3485", "url": "https://www.suse.com/security/cve/CVE-2016-3485" }, { "category": "external", "summary": "SUSE Bug 1009280 for CVE-2016-3485", "url": "https://bugzilla.suse.com/1009280" }, { "category": "external", "summary": "SUSE Bug 989734 for CVE-2016-3485", "url": "https://bugzilla.suse.com/989734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3485" }, { "cve": "CVE-2016-3498", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3498" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows remote attackers to affect availability via vectors related to JavaFX.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3498", "url": "https://www.suse.com/security/cve/CVE-2016-3498" }, { "category": "external", "summary": "SUSE Bug 989729 for CVE-2016-3498", "url": "https://bugzilla.suse.com/989729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3498" }, { "cve": "CVE-2016-3500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3500" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3508.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3500", "url": "https://www.suse.com/security/cve/CVE-2016-3500" }, { "category": "external", "summary": "SUSE Bug 989730 for CVE-2016-3500", "url": "https://bugzilla.suse.com/989730" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3500" }, { "cve": "CVE-2016-3503", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3503" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3503", "url": "https://www.suse.com/security/cve/CVE-2016-3503" }, { "category": "external", "summary": "SUSE Bug 989728 for CVE-2016-3503", "url": "https://bugzilla.suse.com/989728" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3503" }, { "cve": "CVE-2016-3508", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3508" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3500.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3508", "url": "https://www.suse.com/security/cve/CVE-2016-3508" }, { "category": "external", "summary": "SUSE Bug 989731 for CVE-2016-3508", "url": "https://bugzilla.suse.com/989731" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3508" }, { "cve": "CVE-2016-3511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3511" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Deployment.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3511", "url": "https://www.suse.com/security/cve/CVE-2016-3511" }, { "category": "external", "summary": "SUSE Bug 1009280 for CVE-2016-3511", "url": "https://bugzilla.suse.com/1009280" }, { "category": "external", "summary": "SUSE Bug 989727 for CVE-2016-3511", "url": "https://bugzilla.suse.com/989727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3511" }, { "cve": "CVE-2016-3550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3550" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality via vectors related to Hotspot.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3550", "url": "https://www.suse.com/security/cve/CVE-2016-3550" }, { "category": "external", "summary": "SUSE Bug 989733 for CVE-2016-3550", "url": "https://bugzilla.suse.com/989733" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3550" }, { "cve": "CVE-2016-3552", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3552" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3552", "url": "https://www.suse.com/security/cve/CVE-2016-3552" }, { "category": "external", "summary": "SUSE Bug 989726 for CVE-2016-3552", "url": "https://bugzilla.suse.com/989726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3552" }, { "cve": "CVE-2016-3587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3587" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3587", "url": "https://www.suse.com/security/cve/CVE-2016-3587" }, { "category": "external", "summary": "SUSE Bug 989721 for CVE-2016-3587", "url": "https://bugzilla.suse.com/989721" }, { "category": "external", "summary": "SUSE Bug 998845 for CVE-2016-3587", "url": "https://bugzilla.suse.com/998845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-3587" }, { "cve": "CVE-2016-3598", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3598" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3598", "url": "https://www.suse.com/security/cve/CVE-2016-3598" }, { "category": "external", "summary": "SUSE Bug 1009280 for CVE-2016-3598", "url": "https://bugzilla.suse.com/1009280" }, { "category": "external", "summary": "SUSE Bug 989723 for CVE-2016-3598", "url": "https://bugzilla.suse.com/989723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-3598" }, { "cve": "CVE-2016-3606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3606" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3606", "url": "https://www.suse.com/security/cve/CVE-2016-3606" }, { "category": "external", "summary": "SUSE Bug 989722 for CVE-2016-3606", "url": "https://bugzilla.suse.com/989722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-3606" }, { "cve": "CVE-2016-3610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3610" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3598.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3610", "url": "https://www.suse.com/security/cve/CVE-2016-3610" }, { "category": "external", "summary": "SUSE Bug 989725 for CVE-2016-3610", "url": "https://bugzilla.suse.com/989725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-3610" }, { "cve": "CVE-2016-5542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5542" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to Libraries.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5542", "url": "https://www.suse.com/security/cve/CVE-2016-5542" }, { "category": "external", "summary": "SUSE Bug 1005522 for CVE-2016-5542", "url": "https://bugzilla.suse.com/1005522" }, { "category": "external", "summary": "SUSE Bug 1009280 for CVE-2016-5542", "url": "https://bugzilla.suse.com/1009280" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-5542" }, { "cve": "CVE-2016-5554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5554" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to JMX.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5554", "url": "https://www.suse.com/security/cve/CVE-2016-5554" }, { "category": "external", "summary": "SUSE Bug 1005523 for CVE-2016-5554", "url": "https://bugzilla.suse.com/1005523" }, { "category": "external", "summary": "SUSE Bug 1009280 for CVE-2016-5554", "url": "https://bugzilla.suse.com/1009280" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5554" }, { "cve": "CVE-2016-5556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5556" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to 2D.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5556", "url": "https://www.suse.com/security/cve/CVE-2016-5556" }, { "category": "external", "summary": "SUSE Bug 1005524 for CVE-2016-5556", "url": "https://bugzilla.suse.com/1005524" }, { "category": "external", "summary": "SUSE Bug 1009280 for CVE-2016-5556", "url": "https://bugzilla.suse.com/1009280" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5556" }, { "cve": "CVE-2016-5568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5568" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5568", "url": "https://www.suse.com/security/cve/CVE-2016-5568" }, { "category": "external", "summary": "SUSE Bug 1005525 for CVE-2016-5568", "url": "https://bugzilla.suse.com/1005525" }, { "category": "external", "summary": "SUSE Bug 1009280 for CVE-2016-5568", "url": "https://bugzilla.suse.com/1009280" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5568" }, { "cve": "CVE-2016-5573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5573" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5582.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5573", "url": "https://www.suse.com/security/cve/CVE-2016-5573" }, { "category": "external", "summary": "SUSE Bug 1005526 for CVE-2016-5573", "url": "https://bugzilla.suse.com/1005526" }, { "category": "external", "summary": "SUSE Bug 1009280 for CVE-2016-5573", "url": "https://bugzilla.suse.com/1009280" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5573" }, { "cve": "CVE-2016-5582", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5582" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5573.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5582", "url": "https://www.suse.com/security/cve/CVE-2016-5582" }, { "category": "external", "summary": "SUSE Bug 1005527 for CVE-2016-5582", "url": "https://bugzilla.suse.com/1005527" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5582" }, { "cve": "CVE-2016-5597", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5597" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality via vectors related to Networking.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5597", "url": "https://www.suse.com/security/cve/CVE-2016-5597" }, { "category": "external", "summary": "SUSE Bug 1005528 for CVE-2016-5597", "url": "https://bugzilla.suse.com/1005528" }, { "category": "external", "summary": "SUSE Bug 1009280 for CVE-2016-5597", "url": "https://bugzilla.suse.com/1009280" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.111-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.111-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5597" } ] }
ghsa-6qrp-fchv-53px
Vulnerability from github
Published
2022-05-13 01:17
Modified
2025-04-12 13:02
Severity ?
VLAI Severity ?
Details
Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
{ "affected": [], "aliases": [ "CVE-2016-3552" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-07-21T10:13:00Z", "severity": "HIGH" }, "details": "Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.", "id": "GHSA-6qrp-fchv-53px", "modified": "2025-04-12T13:02:33Z", "published": "2022-05-13T01:17:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3552" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:1475" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201610-08" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20160721-0001" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/91787" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/92000" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036365" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…