The OpenJDK Java java-1_7_0-openjdk was updated to 2.6.5 to fix the following issues :
Update to 2.6.5 - OpenJDK 7u99 (bsc#972468)
Security fixes
S8152335, CVE-2016-0636: Improve MethodHandle consistency, which could be used by attackers to inject code.
Import of OpenJDK 7 u99 build 0
S6425769, PR2858: Allow specifying an address to bind JMX remote connector
S6961123: setWMClass fails to null-terminate WM_CLASS string
S8145982, PR2858: JMXInterfaceBindingTest is failing intermittently
S8146015, PR2858: JMXInterfaceBindingTest is failing intermittently for IPv6 addresses
Backports
S8028727, PR2814: [parfait] warnings from b116 for jdk.src.share.native.sun.security.ec: JNI pending exceptions
S8048512, PR2814: Uninitialised memory in jdk/src/share/native/sun/security/ec/ECC_JNI.cpp
S8071705. PR2819, RH1182694: Java application menu misbehaves when running multiple screen stacked vertically
S8150954, PR2866, RH1176206: AWT Robot not compatible with GNOME Shell
Bug fixes
PR2803: Make system CUPS optional
PR2886: Location of ‘stap’ executable is hard-coded
PR2893: test/tapset/jstaptest.pl should be executable
PR2894: Add missing test directory in make check.
CACAO
PR2781, CA195: typeinfo.cpp: typeinfo_merge_nonarrays:
Assertion `dest && result && x.any && y.any’ failed
AArch64 port
PR2852: Add support for large code cache
PR2852: Apply ReservedCodeCacheSize default limiting to AArch64 only.
S8081289, PR2852: aarch64: add support for RewriteFrequentPairs in interpreter
S8131483, PR2852: aarch64: illegal stlxr instructions
S8133352, PR2852: aarch64: generates constrained unpredictable instructions
S8133842, PR2852: aarch64: C2 generates illegal instructions with int shifts >=32
S8134322, PR2852: AArch64: Fix several errors in C2 biased locking implementation
S8136615, PR2852: aarch64: elide DecodeN when followed by CmpP 0
S8138575, PR2852: Improve generated code for profile counters
S8138641, PR2852: Disable C2 peephole by default for aarch64
S8138966, PR2852: Intermittent SEGV running ParallelGC
S8143067, PR2852: aarch64: guarantee failure in javac
S8143285, PR2852: aarch64: Missing load acquire when checking if ConstantPoolCacheEntry is resolved
S8143584, PR2852: Load constant pool tag and class status with load acquire
S8144201, PR2852: aarch64:
jdk/test/com/sun/net/httpserver/Test6a.java fails with
–enable-unlimited-crypto
S8144582, PR2852: AArch64 does not generate correct branch profile data
S8146709, PR2852: AArch64: Incorrect use of ADRP for byte_map_base
S8147805, PR2852: aarch64: C1 segmentation fault due to inline Unsafe.getAndSetObject
S8148240, PR2852: aarch64: random infrequent NULL pointer exceptions in javac
PPC & AIX port
S8034797, PR2851: AIX: Fix os::naked_short_sleep() in os_aix.cpp after 8028280
S8139258, PR2851: PPC64LE: argument passing problem when passing 15 floats in native call
S8139421, PR2851: PPC64LE:
MacroAssembler::bxx64_patchable kill register R12
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2016:0956-1.
# The text itself is copyright (C) SUSE.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(90397);
script_version("2.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2016-0636");
script_name(english:"SUSE SLED11 Security Update : java-1_7_0-openjdk (SUSE-SU-2016:0956-1)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote SUSE host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"The OpenJDK Java java-1_7_0-openjdk was updated to 2.6.5 to fix the
following issues :
Update to 2.6.5 - OpenJDK 7u99 (bsc#972468)
- Security fixes
- S8152335, CVE-2016-0636: Improve MethodHandle
consistency, which could be used by attackers to inject
code.
- Import of OpenJDK 7 u99 build 0
- S6425769, PR2858: Allow specifying an address to bind
JMX remote connector
- S6961123: setWMClass fails to null-terminate WM_CLASS
string
- S8145982, PR2858: JMXInterfaceBindingTest is failing
intermittently
- S8146015, PR2858: JMXInterfaceBindingTest is failing
intermittently for IPv6 addresses
- Backports
- S8028727, PR2814: [parfait] warnings from b116 for
jdk.src.share.native.sun.security.ec: JNI pending
exceptions
- S8048512, PR2814: Uninitialised memory in
jdk/src/share/native/sun/security/ec/ECC_JNI.cpp
- S8071705. PR2819, RH1182694: Java application menu
misbehaves when running multiple screen stacked
vertically
- S8150954, PR2866, RH1176206: AWT Robot not compatible
with GNOME Shell
- Bug fixes
- PR2803: Make system CUPS optional
- PR2886: Location of 'stap' executable is hard-coded
- PR2893: test/tapset/jstaptest.pl should be executable
- PR2894: Add missing test directory in make check.
- CACAO
- PR2781, CA195: typeinfo.cpp: typeinfo_merge_nonarrays:
Assertion `dest && result && x.any && y.any' failed
- AArch64 port
- PR2852: Add support for large code cache
- PR2852: Apply ReservedCodeCacheSize default limiting to
AArch64 only.
- S8081289, PR2852: aarch64: add support for
RewriteFrequentPairs in interpreter
- S8131483, PR2852: aarch64: illegal stlxr instructions
- S8133352, PR2852: aarch64: generates constrained
unpredictable instructions
- S8133842, PR2852: aarch64: C2 generates illegal
instructions with int shifts >=32
- S8134322, PR2852: AArch64: Fix several errors in C2
biased locking implementation
- S8136615, PR2852: aarch64: elide DecodeN when followed
by CmpP 0
- S8138575, PR2852: Improve generated code for profile
counters
- S8138641, PR2852: Disable C2 peephole by default for
aarch64
- S8138966, PR2852: Intermittent SEGV running ParallelGC
- S8143067, PR2852: aarch64: guarantee failure in javac
- S8143285, PR2852: aarch64: Missing load acquire when
checking if ConstantPoolCacheEntry is resolved
- S8143584, PR2852: Load constant pool tag and class
status with load acquire
- S8144201, PR2852: aarch64:
jdk/test/com/sun/net/httpserver/Test6a.java fails with
--enable-unlimited-crypto
- S8144582, PR2852: AArch64 does not generate correct
branch profile data
- S8146709, PR2852: AArch64: Incorrect use of ADRP for
byte_map_base
- S8147805, PR2852: aarch64: C1 segmentation fault due to
inline Unsafe.getAndSetObject
- S8148240, PR2852: aarch64: random infrequent NULL
pointer exceptions in javac
- PPC & AIX port
- S8034797, PR2851: AIX: Fix os::naked_short_sleep() in
os_aix.cpp after 8028280
- S8139258, PR2851: PPC64LE: argument passing problem when
passing 15 floats in native call
- S8139421, PR2851: PPC64LE:
MacroAssembler::bxx64_patchable kill register R12
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=972468"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-0636/"
);
# https://www.suse.com/support/update/announcement/2016/suse-su-20160956-1/
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?9226bb77"
);
script_set_attribute(
attribute:"solution",
value:
"To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :
SUSE Linux Enterprise Desktop 11-SP4 :
zypper in -t patch sledsp4-java-1_7_0-openjdk-12493=1
SUSE Linux Enterprise Debuginfo 11-SP4 :
zypper in -t patch dbgsp4-java-1_7_0-openjdk-12493=1
To bring your system up-to-date, use 'zypper patch'."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-demo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-devel");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/03/24");
script_set_attribute(attribute:"patch_publication_date", value:"2016/04/05");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/04/07");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED11)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED11", "SUSE " + os_ver);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
if (cpu >!< "i386|i486|i586|i686|x86_64") audit(AUDIT_ARCH_NOT, "i386 / i486 / i586 / i686 / x86_64", cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLED11" && (! preg(pattern:"^(4)$", string:sp))) audit(AUDIT_OS_NOT, "SLED11 SP4", os_ver + " SP" + sp);
flag = 0;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"java-1_7_0-openjdk-1.7.0.99-0.20.2")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"java-1_7_0-openjdk-demo-1.7.0.99-0.20.2")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"java-1_7_0-openjdk-devel-1.7.0.99-0.20.2")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"java-1_7_0-openjdk-1.7.0.99-0.20.2")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"java-1_7_0-openjdk-demo-1.7.0.99-0.20.2")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"java-1_7_0-openjdk-devel-1.7.0.99-0.20.2")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "java-1_7_0-openjdk");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | java-1_7_0-openjdk | p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk |
novell | suse_linux | java-1_7_0-openjdk-demo | p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-demo |
novell | suse_linux | java-1_7_0-openjdk-devel | p-cpe:/a:novell:suse_linux:java-1_7_0-openjdk-devel |
novell | suse_linux | 11 | cpe:/o:novell:suse_linux:11 |