Anfälligkeitssuche        Suche in 172616 CVE Beschreibungen
und 81291 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:
Kategorie:SuSE Local Security Checks
Titel:openSUSE: Security Advisory for java-1_7_0-openjdk (openSUSE-SU-2016:0971-1)
Zusammenfassung:The remote host is missing an update for the 'java-1_7_0-openjdk'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'java-1_7_0-openjdk'
package(s) announced via the referenced advisory.

Vulnerability Insight:
This update for java-1_7_0-openjdk fixes the following issues:

java-1_7_0-openjdk was updated to 2.6.5 - OpenJDK 7u99 (boo#972468)

* Security fixes

- S8152335, CVE-2016-0636: Improve MethodHandle consistency

* Import of OpenJDK 7 u99 build 0

- S6425769, PR2858: Allow specifying an address to bind JMX remote

- S6961123: setWMClass fails to null-terminate WM_CLASS string

- S8145982, PR2858: JMXInterfaceBindingTest is failing intermittently

- S8146015, PR2858: JMXInterfaceBindingTest is failing intermittently
for IPv6 addresses

* Backports

- S8028727, PR2814: [parfait] warnings from b116 for JNI pending exceptions

- S8048512, PR2814: Uninitialised memory in

- S8071705. PR2819, RH1182694: Java application menu misbehaves when
running multiple screen stacked vertically

- S8150954, PR2866, RH1176206: AWT Robot not compatible with GNOME Shell

* Bug fixes

- PR2803: Make system CUPS optional

- PR2886: Location of 'stap' executable is hard-coded

- PR2893: test/tapset/ should be executable

- PR2894: Add missing test directory in make check.


- PR2781, CA195: typeinfo.cpp: typeinfo_merge_nonarrays: Assertion `dest
& & result & & x.any & & y.any' failed

* AArch64 port

- PR2852: Add support for large code cache

- PR2852: Apply ReservedCodeCacheSize default limiting to AArch64 only.

- S8081289, PR2852: aarch64: add support for RewriteFrequentPairs in

- S8131483, PR2852: aarch64: illegal stlxr instructions

- S8133352, PR2852: aarch64: generates constrained unpredictable

- S8133842, PR2852: aarch64: C2 generates illegal instructions with int
shifts =32

- S8134322, PR2852: AArch64: Fix several errors in C2 biased locking

- S8136615, PR2852: aarch64: elide DecodeN when followed by CmpP 0

- S8138575, PR2852: Improve generated code for profile counters

- S8138641, PR2852: Disable C2 peephole by default for aarch64

- S8138966, PR2852: Intermittent SEGV running ParallelGC

- S8143067, PR2852: aarch64: guarantee failure in javac

- S8143285, PR2852: aarch64: Missing load acquire when checking if
ConstantPoolCacheEntry is resolved

- S8143584, PR2852: Load constant pool tag and class status with load

- S8144201, PR2852: aarch64: jdk/test/com/sun/net/httpserver/
fails with

- -enable-unlimited-crypto

- S8144582, PR2852: AArch64 does not generate correct branch profile data

- S8146709, PR2852: AArch64: Incorrect ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
java-1_7_0-openjdk on openSUSE 13.2

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-0636
BugTraq ID: 85376
Debian Security Information: DSA-3558 (Google Search)
RedHat Security Advisories: RHSA-2016:0511
RedHat Security Advisories: RHSA-2016:0512
RedHat Security Advisories: RHSA-2016:0513
RedHat Security Advisories: RHSA-2016:0514
RedHat Security Advisories: RHSA-2016:0515
RedHat Security Advisories: RHSA-2016:0516
SuSE Security Announcement: SUSE-SU-2016:0956 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0957 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0959 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0971 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0983 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1004 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1005 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1042 (Google Search)
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

Dies ist nur einer von 81291 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.