<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for java-1_7_0-openjdk</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:0265-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-01-27T16:34:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-01-27T16:34:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-01-27T16:34:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for java-1_7_0-openjdk</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">java-1_7_0-openjdk was updated to version 7u95 to fix 9 security issues. (bsc#962743)

- CVE-2015-4871: Rebinding of the receiver of a DirectMethodHandle may allow a protected method to be accessed
- CVE-2015-7575: Further reduce use of MD5 (SLOTH) (bsc#960996)
- CVE-2015-8126: Vulnerability in the AWT component related to splashscreen displays
- CVE-2015-8472: Vulnerability in the AWT component, addressed by same fix
- CVE-2016-0402: Vulnerability in the Networking component related to URL processing
- CVE-2016-0448: Vulnerability in the JMX comonent related to attribute processing
- CVE-2016-0466: Vulnerability in the JAXP component, related to limits
- CVE-2016-0483: Vulnerability in the AWT component related to image decoding
- CVE-2016-0494: Vulnerability in 2D component related to font actions

The following bugs were fixed:

- bsc#939523: java-1_7_0-openjdk-headless had X dependencies, move libjavagtk to full package
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-DESKTOP-12-2016-169,SUSE-SLE-DESKTOP-12-SP1-2016-169,SUSE-SLE-SERVER-12-2016-169,SUSE-SLE-SERVER-12-SP1-2016-169</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160265-1/</URL>
      <Description>Link for SUSE-SU-2016:0265-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:0265-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/939523</URL>
      <Description>SUSE Bug 939523</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/960996</URL>
      <Description>SUSE Bug 960996</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/962743</URL>
      <Description>SUSE Bug 962743</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4871/</URL>
      <Description>SUSE CVE CVE-2015-4871 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7575/</URL>
      <Description>SUSE CVE CVE-2015-7575 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8126/</URL>
      <Description>SUSE CVE CVE-2015-8126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8472/</URL>
      <Description>SUSE CVE CVE-2015-8472 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0402/</URL>
      <Description>SUSE CVE CVE-2016-0402 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0448/</URL>
      <Description>SUSE CVE CVE-2016-0448 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0466/</URL>
      <Description>SUSE CVE CVE-2016-0466 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0483/</URL>
      <Description>SUSE CVE CVE-2016-0483 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0494/</URL>
      <Description>SUSE CVE CVE-2016-0494 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12" CPE="cpe:/o:suse:sled:12">SUSE Linux Enterprise Desktop 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1" CPE="cpe:/o:suse:sled:12:sp1">SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12" CPE="cpe:/o:suse:sles:12">SUSE Linux Enterprise Server 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1" CPE="cpe:/o:suse:sles:12:sp1">SUSE Linux Enterprise Server 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1" CPE="cpe:/o:suse:sles_sap:12:sp1">SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-1.7.0.95-24.2">
      <FullProductName ProductID="java-1_7_0-openjdk-1.7.0.95-24.2">java-1_7_0-openjdk-1.7.0.95-24.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-headless-1.7.0.95-24.2">
      <FullProductName ProductID="java-1_7_0-openjdk-headless-1.7.0.95-24.2">java-1_7_0-openjdk-headless-1.7.0.95-24.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-demo-1.7.0.95-24.2">
      <FullProductName ProductID="java-1_7_0-openjdk-demo-1.7.0.95-24.2">java-1_7_0-openjdk-demo-1.7.0.95-24.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_7_0-openjdk-devel-1.7.0.95-24.2">
      <FullProductName ProductID="java-1_7_0-openjdk-devel-1.7.0.95-24.2">java-1_7_0-openjdk-devel-1.7.0.95-24.2</FullProductName>
    </Branch>
    <Relationship ProductReference="java-1_7_0-openjdk-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-1.7.0.95-24.2">java-1_7_0-openjdk-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-headless-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2">java-1_7_0-openjdk-headless-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2">java-1_7_0-openjdk-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-headless-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2">java-1_7_0-openjdk-headless-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-1.7.0.95-24.2">java-1_7_0-openjdk-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-demo-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2">java-1_7_0-openjdk-demo-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-devel-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2">java-1_7_0-openjdk-devel-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-headless-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2">java-1_7_0-openjdk-headless-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2">java-1_7_0-openjdk-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-demo-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2">java-1_7_0-openjdk-demo-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-devel-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2">java-1_7_0-openjdk-devel-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-headless-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2">java-1_7_0-openjdk-headless-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-1.7.0.95-24.2">java-1_7_0-openjdk-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-demo-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2">java-1_7_0-openjdk-demo-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-devel-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2">java-1_7_0-openjdk-devel-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-headless-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2">java-1_7_0-openjdk-headless-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2">java-1_7_0-openjdk-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-demo-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2">java-1_7_0-openjdk-demo-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-devel-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2">java-1_7_0-openjdk-devel-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_7_0-openjdk-headless-1.7.0.95-24.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2">java-1_7_0-openjdk-headless-1.7.0.95-24.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 7u85 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.</Note>
    </Notes>
    <CVE>CVE-2015-4871</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160265-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4871.html</URL>
        <Description>CVE-2015-4871</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951376</URL>
        <Description>SUSE Bug 951376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955131</URL>
        <Description>SUSE Bug 955131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.</Note>
    </Notes>
    <CVE>CVE-2015-7575</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160265-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7575.html</URL>
        <Description>CVE-2015-7575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959888</URL>
        <Description>SUSE Bug 959888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960996</URL>
        <Description>SUSE Bug 960996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961280</URL>
        <Description>SUSE Bug 961280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961281</URL>
        <Description>SUSE Bug 961281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961282</URL>
        <Description>SUSE Bug 961282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961283</URL>
        <Description>SUSE Bug 961283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961284</URL>
        <Description>SUSE Bug 961284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961290</URL>
        <Description>SUSE Bug 961290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961357</URL>
        <Description>SUSE Bug 961357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967521</URL>
        <Description>SUSE Bug 967521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981087</URL>
        <Description>SUSE Bug 981087</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.</Note>
    </Notes>
    <CVE>CVE-2015-8126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160265-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8126.html</URL>
        <Description>CVE-2015-8126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954980</URL>
        <Description>SUSE Bug 954980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958198</URL>
        <Description>SUSE Bug 958198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969333</URL>
        <Description>SUSE Bug 969333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.</Note>
    </Notes>
    <CVE>CVE-2015-8472</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160265-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8472.html</URL>
        <Description>CVE-2015-8472</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954980</URL>
        <Description>SUSE Bug 954980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958198</URL>
        <Description>SUSE Bug 958198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect integrity via unknown vectors related to Networking.</Note>
    </Notes>
    <CVE>CVE-2016-0402</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160265-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0402.html</URL>
        <Description>CVE-2016-0402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX.</Note>
    </Notes>
    <CVE>CVE-2016-0448</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160265-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0448.html</URL>
        <Description>CVE-2016-0448</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect availability via vectors related to JAXP.</Note>
    </Notes>
    <CVE>CVE-2016-0466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160265-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0466.html</URL>
        <Description>CVE-2016-0466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote attackers to execute arbitrary code via crafted image data.</Note>
    </Notes>
    <CVE>CVE-2016-0483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160265-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0483.html</URL>
        <Description>CVE-2016-0483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.</Note>
    </Notes>
    <CVE>CVE-2016-0494</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-demo-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-devel-1.7.0.95-24.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:java-1_7_0-openjdk-headless-1.7.0.95-24.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160265-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0494.html</URL>
        <Description>CVE-2016-0494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
