<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for java-1_7_0-ibm</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:1375-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-07-31T13:14:30Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-07-31T13:14:30Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-07-31T13:14:30Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for java-1_7_0-ibm</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">java-1_7_0-ibm was updated to fix 21 security issues.

These security issues were fixed:
- CVE-2015-4729: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allowed remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment (bsc#938895).
- CVE-2015-4748: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security (bsc#938895).
- CVE-2015-2664: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment (bsc#938895).
- CVE-2015-0192: Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allowed remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine (bsc#938895).
- CVE-2015-2613: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JCE (bsc#938895).
- CVE-2015-4731: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX (bsc#938895).
- CVE-2015-2637: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-4733: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI (bsc#938895).
- CVE-2015-4732: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590 (bsc#938895).
- CVE-2015-2621: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allowed remote attackers to affect confidentiality via vectors related to JMX (bsc#938895).
- CVE-2015-2619: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-2590: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732 (bsc#938895).
- CVE-2015-2638: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#938895).
- CVE-2015-2625: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JSSE (bsc#938895).
- CVE-2015-2632: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-1931: Unspecified vulnerability (bsc#938895).
- CVE-2015-4760: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#938895).
- CVE-2015-4000: The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, did not properly convey a DHE_EXPORT choice, which allowed man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the 'Logjam' issue (bsc#935540).
- CVE-2015-2601: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JCE (bsc#938895).
- CVE-2015-2808: The RC4 algorithm, as used in the TLS protocol and SSL protocol, did not properly combine state data with key data during the initialization phase, which made it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the 'Bar Mitzvah' issue (bsc#938895).
- CVE-2015-4749: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect availability via vectors related to JNDI (bsc#938895).
  </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sdksp3-java-1_7_0-ibm-12026,slessp2-java-1_7_0-ibm-12026,slessp3-java-1_7_0-ibm-12026</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      <Description>Link for SUSE-SU-2015:1375-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:1375-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/935540</URL>
      <Description>SUSE Bug 935540</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/938895</URL>
      <Description>SUSE Bug 938895</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0192/</URL>
      <Description>SUSE CVE CVE-2015-0192 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1931/</URL>
      <Description>SUSE CVE CVE-2015-1931 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2590/</URL>
      <Description>SUSE CVE CVE-2015-2590 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2601/</URL>
      <Description>SUSE CVE CVE-2015-2601 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2613/</URL>
      <Description>SUSE CVE CVE-2015-2613 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2619/</URL>
      <Description>SUSE CVE CVE-2015-2619 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2621/</URL>
      <Description>SUSE CVE CVE-2015-2621 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2625/</URL>
      <Description>SUSE CVE CVE-2015-2625 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2632/</URL>
      <Description>SUSE CVE CVE-2015-2632 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2637/</URL>
      <Description>SUSE CVE CVE-2015-2637 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2638/</URL>
      <Description>SUSE CVE CVE-2015-2638 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2664/</URL>
      <Description>SUSE CVE CVE-2015-2664 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2808/</URL>
      <Description>SUSE CVE CVE-2015-2808 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4000/</URL>
      <Description>SUSE CVE CVE-2015-4000 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4729/</URL>
      <Description>SUSE CVE CVE-2015-4729 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4731/</URL>
      <Description>SUSE CVE CVE-2015-4731 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4732/</URL>
      <Description>SUSE CVE CVE-2015-4732 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4733/</URL>
      <Description>SUSE CVE CVE-2015-4733 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4748/</URL>
      <Description>SUSE CVE CVE-2015-4748 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4749/</URL>
      <Description>SUSE CVE CVE-2015-4749 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4760/</URL>
      <Description>SUSE CVE CVE-2015-4760 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp2">SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3" CPE="cpe:/o:suse:suse_sles:11:sp3">SUSE Linux Enterprise Server 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA" CPE="cpe:/o:suse:sles:11:sp3:teradata">SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3" CPE="cpe:/o:suse:sles_sap:11:sp3">SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3" CPE="cpe:/a:suse:sle-sdk:11:sp3">SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1">
      <FullProductName ProductID="java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1">java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-ibm-1.7.0_sr9.10-9.1">
      <FullProductName ProductID="java-1_7_0-ibm-1.7.0_sr9.10-9.1">java-1_7_0-ibm-1.7.0_sr9.10-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1">
      <FullProductName ProductID="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1">java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1">
      <FullProductName ProductID="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1">java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1">
      <FullProductName ProductID="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1">java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="java-1_7_0-ibm-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1">java-1_7_0-ibm-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1">java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1">java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1">java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1">java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1">java-1_7_0-ibm-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1">java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1">java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1">java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1">java-1_7_0-ibm-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1">java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1">java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1">java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1">java-1_7_0-ibm-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1">java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1">java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1">java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1">java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine.</Note>
    </Notes>
    <CVE>CVE-2015-0192</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0192.html</URL>
        <Description>CVE-2015-0192</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952088</URL>
        <Description>SUSE Bug 952088</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR1 FP10, 7 R1 before SR3 FP10, 7 before SR9 FP10, 6 R1 before SR8 FP7, 6 before SR16 FP7, and 5.0 before SR16 FP13 stores plaintext information in memory dumps, which allows local users to obtain sensitive information by reading a file.</Note>
    </Notes>
    <CVE>CVE-2015-1931</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1931.html</URL>
        <Description>CVE-2015-1931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939382</URL>
        <Description>SUSE Bug 939382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.</Note>
    </Notes>
    <CVE>CVE-2015-2590</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2590.html</URL>
        <Description>CVE-2015-2590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.</Note>
    </Notes>
    <CVE>CVE-2015-2601</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2601.html</URL>
        <Description>CVE-2015-2601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.</Note>
    </Notes>
    <CVE>CVE-2015-2613</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2613.html</URL>
        <Description>CVE-2015-2613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951727</URL>
        <Description>SUSE Bug 951727</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.</Note>
    </Notes>
    <CVE>CVE-2015-2619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2619.html</URL>
        <Description>CVE-2015-2619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allows remote attackers to affect confidentiality via vectors related to JMX.</Note>
    </Notes>
    <CVE>CVE-2015-2621</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2621.html</URL>
        <Description>CVE-2015-2621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JSSE.</Note>
    </Notes>
    <CVE>CVE-2015-2625</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2625.html</URL>
        <Description>CVE-2015-2625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to 2D.</Note>
    </Notes>
    <CVE>CVE-2015-2632</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2632.html</URL>
        <Description>CVE-2015-2632</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.</Note>
    </Notes>
    <CVE>CVE-2015-2637</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2637.html</URL>
        <Description>CVE-2015-2637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.</Note>
    </Notes>
    <CVE>CVE-2015-2638</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2638.html</URL>
        <Description>CVE-2015-2638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.</Note>
    </Notes>
    <CVE>CVE-2015-2664</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2664.html</URL>
        <Description>CVE-2015-2664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.</Note>
    </Notes>
    <CVE>CVE-2015-2808</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2808.html</URL>
        <Description>CVE-2015-2808</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/925378</URL>
        <Description>SUSE Bug 925378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952088</URL>
        <Description>SUSE Bug 952088</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.</Note>
    </Notes>
    <CVE>CVE-2015-4000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.3</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4000.html</URL>
        <Description>CVE-2015-4000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074631</URL>
        <Description>SUSE Bug 1074631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211968</URL>
        <Description>SUSE Bug 1211968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931600</URL>
        <Description>SUSE Bug 931600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931698</URL>
        <Description>SUSE Bug 931698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931723</URL>
        <Description>SUSE Bug 931723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931845</URL>
        <Description>SUSE Bug 931845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932026</URL>
        <Description>SUSE Bug 932026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932483</URL>
        <Description>SUSE Bug 932483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934789</URL>
        <Description>SUSE Bug 934789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935033</URL>
        <Description>SUSE Bug 935033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935540</URL>
        <Description>SUSE Bug 935540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935979</URL>
        <Description>SUSE Bug 935979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937202</URL>
        <Description>SUSE Bug 937202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937766</URL>
        <Description>SUSE Bug 937766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938432</URL>
        <Description>SUSE Bug 938432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938905</URL>
        <Description>SUSE Bug 938905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938906</URL>
        <Description>SUSE Bug 938906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938913</URL>
        <Description>SUSE Bug 938913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938945</URL>
        <Description>SUSE Bug 938945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943664</URL>
        <Description>SUSE Bug 943664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944729</URL>
        <Description>SUSE Bug 944729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945582</URL>
        <Description>SUSE Bug 945582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955589</URL>
        <Description>SUSE Bug 955589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980406</URL>
        <Description>SUSE Bug 980406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990592</URL>
        <Description>SUSE Bug 990592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994144</URL>
        <Description>SUSE Bug 994144</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment.</Note>
    </Notes>
    <CVE>CVE-2015-4729</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4729.html</URL>
        <Description>CVE-2015-4729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.</Note>
    </Notes>
    <CVE>CVE-2015-4731</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4731.html</URL>
        <Description>CVE-2015-4731</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590.</Note>
    </Notes>
    <CVE>CVE-2015-4732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4732.html</URL>
        <Description>CVE-2015-4732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.</Note>
    </Notes>
    <CVE>CVE-2015-4733</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4733.html</URL>
        <Description>CVE-2015-4733</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.</Note>
    </Notes>
    <CVE>CVE-2015-4748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4748.html</URL>
        <Description>CVE-2015-4748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect availability via vectors related to JNDI.</Note>
    </Notes>
    <CVE>CVE-2015-4749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4749.html</URL>
        <Description>CVE-2015-4749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.</Note>
    </Notes>
    <CVE>CVE-2015-4760</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151375-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4760.html</URL>
        <Description>CVE-2015-4760</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937828</URL>
        <Description>SUSE Bug 937828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
