SUSE SLED12 / SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2016:1997-1)

High Nessus Plugin ID 93272

Synopsis

The remote SUSE host is missing one or more security updates.

Description

This update for java-1_7_0-openjdk fixes the following issues :

- Update to 2.6.7 - OpenJDK 7u111

- Security fixes

- S8079718, CVE-2016-3458: IIOP Input Stream Hooking (bsc#989732)

- S8145446, CVE-2016-3485: Perfect pipe placement (Windows only) (bsc#989734)

- S8147771: Construction of static protection domains under Javax custom policy

- S8148872, CVE-2016-3500: Complete name checking (bsc#989730)

- S8149962, CVE-2016-3508: Better delineation of XML processing (bsc#989731)

- S8150752: Share Class Data

- S8151925: Font reference improvements

- S8152479, CVE-2016-3550: Coded byte streams (bsc#989733)

- S8155981, CVE-2016-3606: Bolster bytecode verification (bsc#989722)

- S8155985, CVE-2016-3598: Persistent Parameter Processing (bsc#989723)

- S8158571, CVE-2016-3610: Additional method handle validation (bsc#989725)

- CVE-2016-3511 (bsc#989727)

- CVE-2016-3503 (bsc#989728)

- CVE-2016-3498 (bsc#989729)

- Import of OpenJDK 7 u111 build 0

- S6953295: Move few sun.security.{util, x509, pkcs} classes used by keytool/jarsigner to another package

- S7060849: Eliminate pack200 build warnings

- S7064075: Security libraries don't build with javac

-Xlint:all,-deprecation -Werror

- S7069870: Parts of the JDK erroneously rely on generic array initializers with diamond

- S7102686: Restructure timestamp code so that jars and modules can more easily share the same code

- S7105780: Add SSLSocket client/SSLEngine server to templates directory

- S7142339: PKCS7.java is needlessly creating SHA1PRNG SecureRandom instances when timestamping is not done

- S7152582: PKCS11 tests should use the NSS libraries available in the OS

- S7192202: Make sure keytool prints both unknown and unparseable extensions

- S7194449: String resources for Key Tool and Policy Tool should be in their respective packages

- S7196855: autotest.sh fails on ubuntu because libsoftokn.so not found

- S7200682: TEST_BUG: keytool/autotest.sh still has problems with libsoftokn.so

- S8002306: (se) Selector.open fails if invoked with thread interrupt status set [win]

- S8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161

- S8019341: Update CookieHttpsClientTest to use the newer framework.

- S8022228: Intermittent test failures in sun/security/ssl/javax/net/ssl/NewAPIs

- S8022439: Fix lint warnings in sun.security.ec

- S8022594: Potential deadlock in <clinit> of sun.nio.ch.Util/IOUtil

- S8023546: sun/security/mscapi/ShortRSAKey1024.sh fails intermittently

- S8036612: [parfait] JNI exception pending in jdk/src/windows/native/sun/security/mscapi/security.cpp

- S8037557: test SessionCacheSizeTests.java timeout

- S8038837: Add support to jarsigner for specifying timestamp hash algorithm

- S8079410: Hotspot version to share the same update and build version from JDK

- S8130735: javax.swing.TimerQueue: timer fires late when another timer starts

- S8139436: sun.security.mscapi.KeyStore might load incomplete data

- S8144313: Test SessionTimeOutTests can be timeout

- S8146387: Test SSLSession/SessionCacheSizeTests socket accept timed out

- S8146669: Test SessionTimeOutTests fails intermittently

- S8146993: Several javax/management/remote/mandatory regression tests fail after JDK-8138811

- S8147857: [TEST] RMIConnector logs attribute names incorrectly

- S8151841, PR3098: Build needs additional flags to compile with GCC 6

- S8151876: (tz) Support tzdata2016d

- S8157077: 8u101 L10n resource file updates

- S8161262: Fix jdk build with gcc 4.1.2:
-fno-strict-overflow not known.

- Import of OpenJDK 7 u111 build 1

- S7081817:
test/sun/security/provider/certpath/X509CertPath/Illegal Certificates.java f ailing

- S8140344: add support for 3 digit update release numbers

- S8145017: Add support for 3 digit hotspot minor version numbers

- S8162344: The API changes made by CR 7064075 need to be reverted

- Backports

- S2178143, PR2958: JVM crashes if the number of bound CPUs changed during runtime

- S4900206, PR3101: Include worst-case rounding tests for Math library functions

- S6260348, PR3067: GTK+ L&F JTextComponent not respecting desktop caret blink rate

- S6934604, PR3075: enable parts of EliminateAutoBox by default

- S7043064, PR3020: sun/java2d/cmm/ tests failed against RI b141 & b138-nightly

- S7051394, PR3020: NullPointerException when running regression tests LoadProfileTest by using openjdk-7-b144

- S7086015, PR3013: fix test/tools/javac/parser/netbeans/JavacParserTest.java

- S7119487, PR3013: JavacParserTest.java test fails on Windows platforms

- S7124245, PR3020: [lcms] ColorConvertOp to color space CS_GRAY apparently converts orange to 244,244,0

- S7159445, PR3013: (javac) emits inaccurate diagnostics for enhanced for-loops

- S7175845, PR1437, RH1207129: 'jar uf' changes file permissions unexpectedly

- S8005402, PR3020: Need to provide benchmarks for color management

- S8005530, PR3020: [lcms] Improve performance of ColorConverOp for default destinations

- S8005930, PR3020: [lcms] ColorConvertOp: Alpha channel is not transferred from source to destination.

- S8013430, PR3020: REGRESSION:
closed/java/awt/color/ICC_Profile/LoadProfileTest/LoadPr ofileTest.java fail s with java.io.StreamCorruptedException: invalid type code: EE since 8b87

- S8014286, PR3075: failed java/lang/Math/DivModTests.java after 6934604 changes

- S8014959, PR3075:
assert(Compile::current()->live_nodes() (uint)MaxNodeLimit) failed: Live Node limit exceeded limit

- S8019247, PR3075: SIGSEGV in compiled method c8e.e.t_.getArray(Ljava/lang/Class;)[Ljava/lang/Object

- S8024511, PR3020: Crash during color profile destruction

- S8025429, PR3020: [parfait] warnings from b107 for sun.java2d.cmm: JNI exception pending

- S8026702, PR3020: Fix for 8025429 breaks jdk build on windows

- S8026780, PR3020, RH1142587: Crash on PPC and PPC v2 for Java_awt test suit

- S8047066, PR3020: Test test/sun/awt/image/bug8038000.java fails with ClassCastException

- S8069181, PR3012, RH1015612: java.lang.AssertionError when compiling JDK 1.4 code in JDK 8

- S8158260, PR2992, RH1341258: PPC64: unaligned Unsafe.getInt can lead to the generation of illegal instructions (bsc#988651)

- S8159244, PR3075: Partially initialized string object created by C2's string concat optimization may escape

- Bug fixes

- PR2799, RH1195203: Files are missing from resources.jar

- PR2900: Don't use WithSeed versions of NSS functions as they don't fully process the seed

- PR3091: SystemTap is heavily confused by multiple JDKs

- PR3102: Extend 8022594 to AixPollPort

- PR3103: Handle case in clean-fonts where linux.fontconfig.Gentoo.properties.old has not been created

- PR3111: Provide option to disable SystemTap tests

- PR3114: Don't assume system mime.types supports text/x-java-source

- PR3115: Add check for elliptic curve cryptography implementation

- PR3116: Add tests for Java debug info and source files

- PR3118: Path to agpl-3.0.txt not updated

- PR3119: Makefile handles cacerts as a symlink, but the configure check doesn't

- AArch64 port

- S8148328, PR3100: aarch64: redundant lsr instructions in stub code.

- S8148783, PR3100: aarch64: SEGV running SpecJBB2013

- S8148948, PR3100: aarch64: generate_copy_longs calls align() incorrectly

- S8150045, PR3100: arraycopy causes segfaults in SATB during garbage collection

- S8154537, PR3100: AArch64: some integer rotate instructions are never emitted

- S8154739, PR3100: AArch64: TemplateTable::fast_xaccess loads in wrong mode

- S8157906, PR3100: aarch64: some more integer rotate instructions are never emitted

- Enable SunEC for SLE12 and Leap (bsc#982366)

- Fix aarch64 running with 48 bits va space (bsc#984684)</clinit>

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Server 12-SP1:zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1186=1

SUSE Linux Enterprise Desktop 12-SP1:zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1186=1

To bring your system up-to-date, use 'zypper patch'.

See Also

https://bugzilla.suse.com/show_bug.cgi?id=982366

https://bugzilla.suse.com/show_bug.cgi?id=984684

https://bugzilla.suse.com/show_bug.cgi?id=988651

https://bugzilla.suse.com/show_bug.cgi?id=989722

https://bugzilla.suse.com/show_bug.cgi?id=989723

https://bugzilla.suse.com/show_bug.cgi?id=989725

https://bugzilla.suse.com/show_bug.cgi?id=989727

https://bugzilla.suse.com/show_bug.cgi?id=989728

https://bugzilla.suse.com/show_bug.cgi?id=989729

https://bugzilla.suse.com/show_bug.cgi?id=989730

https://bugzilla.suse.com/show_bug.cgi?id=989731

https://bugzilla.suse.com/show_bug.cgi?id=989732

https://bugzilla.suse.com/show_bug.cgi?id=989733

https://bugzilla.suse.com/show_bug.cgi?id=989734

https://www.suse.com/security/cve/CVE-2016-3458/

https://www.suse.com/security/cve/CVE-2016-3485/

https://www.suse.com/security/cve/CVE-2016-3498/

https://www.suse.com/security/cve/CVE-2016-3500/

https://www.suse.com/security/cve/CVE-2016-3503/

https://www.suse.com/security/cve/CVE-2016-3508/

https://www.suse.com/security/cve/CVE-2016-3511/

https://www.suse.com/security/cve/CVE-2016-3550/

https://www.suse.com/security/cve/CVE-2016-3598/

https://www.suse.com/security/cve/CVE-2016-3606/

https://www.suse.com/security/cve/CVE-2016-3610/

http://www.nessus.org/u?2041c177

Plugin Details

Severity: High

ID: 93272

File Name: suse_SU-2016-1997-1.nasl

Version: 2.6

Type: local

Agent: unix

Published: 2016/09/02

Updated: 2018/11/29

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 9.6

Temporal Score: 8.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-debuginfo, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-debugsource, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-demo, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-demo-debuginfo, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-devel, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-devel-debuginfo, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-headless, p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-headless-debuginfo, cpe:/o:novell:suse_linux:12

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/08/09

Reference Information

CVE: CVE-2016-3458, CVE-2016-3485, CVE-2016-3498, CVE-2016-3500, CVE-2016-3503, CVE-2016-3508, CVE-2016-3511, CVE-2016-3550, CVE-2016-3598, CVE-2016-3606, CVE-2016-3610