SuSE Update for java-1_8_0-openjdk openSUSE-SU-2016:2985-1 (java-1_8_0-openjdk)

2016-12-03T00:00:00
ID OPENVAS:1361412562310851438
Type openvas
Reporter Copyright (C) 2016 Greenbone Networks GmbH
Modified 2017-12-08T00:00:00

Description

Check the version of java-1_8_0-openjdk

                                        
                                            ###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_suse_2016_2985_1.nasl 8047 2017-12-08 08:56:07Z santu $
#
# SuSE Update for java-1_8_0-openjdk openSUSE-SU-2016:2985-1 (java-1_8_0-openjdk)
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.851438");
  script_version("$Revision: 8047 $");
  script_tag(name:"last_modification", value:"$Date: 2017-12-08 09:56:07 +0100 (Fri, 08 Dec 2017) $");
  script_tag(name:"creation_date", value:"2016-12-03 05:43:39 +0100 (Sat, 03 Dec 2016)");
  script_cve_id("CVE-2016-5542", "CVE-2016-5554", "CVE-2016-5556", "CVE-2016-5568", 
                "CVE-2016-5573", "CVE-2016-5582", "CVE-2016-5597");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_tag(name:"qod_type", value:"package");
  script_name("SuSE Update for java-1_8_0-openjdk openSUSE-SU-2016:2985-1 (java-1_8_0-openjdk)");
  script_tag(name: "summary", value: "Check the version of java-1_8_0-openjdk");
  script_tag(name: "vuldetect", value: "Get the installed version with the help 
of detect NVT and check if the version is vulnerable or not.");
  script_tag(name: "insight", value: "
  OpenJDK Java was updated to jdk8u111 (icedtea 3.2.0) to fix the following
  issues:

  * Security fixes
  + S8146490: Direct indirect CRL checks
  + S8151921: Improved page resolution
  + S8155968: Update command line options
  + S8155973, CVE-2016-5542: Tighten jar checks (bsc#1005522)
  + S8156794: Extend data sharing
  + S8157176: Improved classfile parsing
  + S8157739, CVE-2016-5554: Classloader Consistency Checking
  (bsc#1005523)
  + S8157749: Improve handling of DNS error replies
  + S8157753: Audio replay enhancement
  + S8157759: LCMS Transform Sampling Enhancement
  + S8157764: Better handling of interpolation plugins
  + S8158302: Handle contextual glyph substitutions
  + S8158993, CVE-2016-5568: Service Menu services (bsc#1005525)
  + S8159495: Fix index offsets
  + S8159503: Amend Annotation Actions
  + S8159511: Stack map validation
  + S8159515: Improve indy validation
  + S8159519, CVE-2016-5573: Reformat JDWP messages (bsc#1005526)
  + S8160090: Better signature handling in pack200
  + S8160094: Improve pack200 layout
  + S8160098: Clean up color profiles
  + S8160591, CVE-2016-5582: Improve internal array handling
  (bsc#1005527)
  + S8160838, CVE-2016-5597: Better HTTP service (bsc#1005528)
  + PR3206, RH1367357: lcms2: Out-of-bounds read in Type_MLU_Read()
  + CVE-2016-5556 (bsc#1005524)
  * New features
  + PR1370: Provide option to build without debugging
  + PR1375: Provide option to strip and link debugging info after build
  + PR1537: Handle alternative Kerberos credential cache locations
  + PR1978: Allow use of system PCSC
  + PR2445: Support system libsctp
  + PR3182: Support building without pre-compiled headers
  + PR3183: Support Fedora/RHEL system crypto policy
  + PR3221: Use pkgconfig to detect Kerberos CFLAGS and libraries
  * Import of OpenJDK 8 u102 build 14
  + S4515292: ReferenceType.isStatic() returns true for arrays
  + S4858370: JDWP: Memory Leak: GlobalRefs never deleted when
  processing invokeMethod command
  + S6976636: JVM/TI test ex03t001 fails assertion
  + S7185591: jcmd-big-script.sh ERROR: could not find app's Java pid.
  + S8017462: G1: guarantee fails with UseDynamicNumberOfGCThreads
  + S8034168: ThreadMXBean/Locks.java failed, blocked on wrong
  object
  + S8036006: [TESTBUG] sun/tools/native2ascii/NativeErrors.java fails:
  Process exit code was 0, but error was expected.
  + S8041781: Need new regression tests for PBE keys
  + S8041787: Need new regressions tests for buffer handling for PBE
  algorithms
  + S8043836: Need new tests for AES cipher
  + S8044199: Tests for RSA keys and key specifications
  + S8044772: ... 

  Description truncated, for more information please check the Reference URL");
  script_tag(name: "affected", value: "java-1_8_0-openjdk on openSUSE Leap 42.1");
  script_tag(name: "solution", value: "Please Install the Updated Packages.");

  script_xref(name: "openSUSE-SU", value: "2016:2985_1");
  script_tag(name:"solution_type", value:"VendorFix");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2016 Greenbone Networks GmbH");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse", "ssh/login/rpms");
  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = get_kb_item("ssh/login/release");

res = "";
if(release == NULL){
  exit(0);
}

if(release == "openSUSELeap42.1")
{

  if ((res = isrpmvuln(pkg:"java-1_8_0-openjdk", rpm:"java-1_8_0-openjdk~1.8.0.111~18.1", rls:"openSUSELeap42.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"java-1_8_0-openjdk-accessibility", rpm:"java-1_8_0-openjdk-accessibility~1.8.0.111~18.1", rls:"openSUSELeap42.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"java-1_8_0-openjdk-debuginfo", rpm:"java-1_8_0-openjdk-debuginfo~1.8.0.111~18.1", rls:"openSUSELeap42.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"java-1_8_0-openjdk-debugsource", rpm:"java-1_8_0-openjdk-debugsource~1.8.0.111~18.1", rls:"openSUSELeap42.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"java-1_8_0-openjdk-demo", rpm:"java-1_8_0-openjdk-demo~1.8.0.111~18.1", rls:"openSUSELeap42.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"java-1_8_0-openjdk-demo-debuginfo", rpm:"java-1_8_0-openjdk-demo-debuginfo~1.8.0.111~18.1", rls:"openSUSELeap42.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"java-1_8_0-openjdk-devel", rpm:"java-1_8_0-openjdk-devel~1.8.0.111~18.1", rls:"openSUSELeap42.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"java-1_8_0-openjdk-devel-debuginfo", rpm:"java-1_8_0-openjdk-devel-debuginfo~1.8.0.111~18.1", rls:"openSUSELeap42.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"java-1_8_0-openjdk-headless", rpm:"java-1_8_0-openjdk-headless~1.8.0.111~18.1", rls:"openSUSELeap42.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"java-1_8_0-openjdk-headless-debuginfo", rpm:"java-1_8_0-openjdk-headless-debuginfo~1.8.0.111~18.1", rls:"openSUSELeap42.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"java-1_8_0-openjdk-src", rpm:"java-1_8_0-openjdk-src~1.8.0.111~18.1", rls:"openSUSELeap42.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"java-1_8_0-openjdk-javadoc", rpm:"java-1_8_0-openjdk-javadoc~1.8.0.111~18.1", rls:"openSUSELeap42.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}