{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2011-0862","title":"Title"},{"category":"description","text":"Multiple unspecified vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allow remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2011-0862","url":"https://www.suse.com/security/cve/CVE-2011-0862"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 698739 for CVE-2011-0862","url":"https://bugzilla.suse.com/698739"},{"category":"external","summary":"SUSE Bug 698754 for CVE-2011-0862","url":"https://bugzilla.suse.com/698754"},{"category":"external","summary":"SUSE Bug 700157 for CVE-2011-0862","url":"https://bugzilla.suse.com/700157"},{"category":"external","summary":"SUSE Bug 705423 for CVE-2011-0862","url":"https://bugzilla.suse.com/705423"},{"category":"external","summary":"SUSE Bug 707244 for CVE-2011-0862","url":"https://bugzilla.suse.com/707244"},{"category":"external","summary":"SUSE Bug 711195 for CVE-2011-0862","url":"https://bugzilla.suse.com/711195"},{"category":"external","summary":"Advisory link for SUSE-SA:2011:030","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NAHASMJVJ3C4KMENOS7PZPOM75TD63S/#7NAHASMJVJ3C4KMENOS7PZPOM75TD63S"},{"category":"external","summary":"Advisory link for SUSE-SA:2011:032","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D2BJFKENZJU7OQDK77WKSCVKAIQ6HZR7/#D2BJFKENZJU7OQDK77WKSCVKAIQ6HZR7"},{"category":"external","summary":"Advisory link for SUSE-SA:2011:036","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGKPTDQN26Z73YF7FZGG4E4HGIXNWXLJ/#MGKPTDQN26Z73YF7FZGG4E4HGIXNWXLJ"},{"category":"external","summary":"Advisory link for SUSE-SU-2011:0632-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WW3CUZCFKKNNCKEQYDORJRK67QPAT63X/#WW3CUZCFKKNNCKEQYDORJRK67QPAT63X"},{"category":"external","summary":"Advisory link for SUSE-SU-2011:0759-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QIVZYOQI4PZXT6GRICOVZTQCNCJKMRMT/#QIVZYOQI4PZXT6GRICOVZTQCNCJKMRMT"},{"category":"external","summary":"Advisory link for SUSE-SU-2011:0807-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R2YFJCQMS5MDKWANZ3CO4KRWJP5CBSF7/#R2YFJCQMS5MDKWANZ3CO4KRWJP5CBSF7"},{"category":"external","summary":"Advisory link for SUSE-SU-2011:0863-2","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VI6IQLJPWJGGPA6C5Y5DCAPS7H5SUAM4/#VI6IQLJPWJGGPA6C5Y5DCAPS7H5SUAM4"},{"category":"external","summary":"Advisory link for SUSE-SU-2011:0966-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJQWKMA2M7PLIWEWQGMGESY6LLBAPBJ/#DYJQWKMA2M7PLIWEWQGMGESY6LLBAPBJ"},{"category":"external","summary":"Advisory link for openSUSE-SU-2011:0633-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD3BFEG4YKCBVFO4X6G47JJZJBHXJN5A/#OD3BFEG4YKCBVFO4X6G47JJZJBHXJN5A"},{"category":"external","summary":"Advisory link for openSUSE-SU-2011:0706-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5KIBL4WKYJICJGD6LIF2X4Y6R2IFNXWR/#5KIBL4WKYJICJGD6LIF2X4Y6R2IFNXWR"},{"category":"external","summary":"Advisory link for openSUSE-SU-2011:0935-2","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MAPVO7VUVIC3A7DXU4QJRQ3MEVCQISHC/#MAPVO7VUVIC3A7DXU4QJRQ3MEVCQISHC"}],"title":"SUSE CVE CVE-2011-0862","tracking":{"current_release_date":"2025-04-25T13:54:47Z","generator":{"date":"2023-02-15T05:54:21Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2011-0862","initial_release_date":"2023-02-15T05:54:21Z","revision_history":[{"date":"2023-02-15T05:54:21Z","number":"2","summary":"Current version"},{"date":"2023-12-08T05:06:50Z","number":"3","summary":"Current version"},{"date":"2023-12-09T03:31:08Z","number":"4","summary":"Current version"},{"date":"2024-04-03T02:31:12Z","number":"5","summary":"Current version"},{"date":"2025-03-14T07:51:57Z","number":"6","summary":"Current version"},{"date":"2025-03-16T14:24:06Z","number":"7","summary":"Current version"},{"date":"2025-04-25T13:54:47Z","number":"8","summary":"Current version"}],"status":"interim","version":"8"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product":{"name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_identification_helper":{"cpe":"cpe:/o:suse:sles:11:sp1:teradata"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 11 SP1","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 11 SP1","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP1","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:11:sp1"}}},{"category":"product_version","name":"java-1_4_2-ibm-1.4.2_sr13.10-0.4.1","product":{"name":"java-1_4_2-ibm-1.4.2_sr13.10-0.4.1","product_id":"java-1_4_2-ibm-1.4.2_sr13.10-0.4.1","product_identification_helper":{"cpe":"cpe:2.3:a:ibm:java:1.4.2_sr13.10:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/java-1_4_2-ibm@1.4.2_sr13.10-0.4.1?upstream=java-1_4_2-ibm-1.4.2_sr13.10-0.4.1.src.rpm"}}},{"category":"product_version","name":"java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1","product":{"name":"java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1","product_id":"java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1","product_identification_helper":{"cpe":"cpe:2.3:a:ibm:java:1.4.2_sr13.18:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/java-1_4_2-ibm-jdbc@1.4.2_sr13.18-0.4.1?upstream=java-1_4_2-ibm-1.4.2_sr13.18-0.4.1.src.rpm"}}},{"category":"product_version","name":"java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1","product":{"name":"java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1","product_id":"java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1","product_identification_helper":{"cpe":"cpe:2.3:a:ibm:java:1.4.2_sr13.18:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/java-1_4_2-ibm-plugin@1.4.2_sr13.18-0.4.1?upstream=java-1_4_2-ibm-1.4.2_sr13.18-0.4.1.src.rpm"}}},{"category":"product_version","name":"java-1_4_2-ibm-sap-1.4.2_sr13.10-0.3.1","product":{"name":"java-1_4_2-ibm-sap-1.4.2_sr13.10-0.3.1","product_id":"java-1_4_2-ibm-sap-1.4.2_sr13.10-0.3.1","product_identification_helper":{"purl":"pkg:rpm/suse/java-1_4_2-ibm-sap@1.4.2_sr13.10-0.3.1?upstream=java-1_4_2-ibm-sap-1.4.2_sr13.10-0.3.1.src.rpm"}}},{"category":"product_version","name":"java-1_4_2-ibm-sap-devel-1.4.2_sr13.10-0.3.1","product":{"name":"java-1_4_2-ibm-sap-devel-1.4.2_sr13.10-0.3.1","product_id":"java-1_4_2-ibm-sap-devel-1.4.2_sr13.10-0.3.1","product_identification_helper":{"purl":"pkg:rpm/suse/java-1_4_2-ibm-sap-devel@1.4.2_sr13.10-0.3.1?upstream=java-1_4_2-ibm-sap-1.4.2_sr13.10-0.3.1.src.rpm"}}},{"category":"product_version","name":"java-1_6_0-ibm-1.6.0_sr9.2-0.4.1","product":{"name":"java-1_6_0-ibm-1.6.0_sr9.2-0.4.1","product_id":"java-1_6_0-ibm-1.6.0_sr9.2-0.4.1","product_identification_helper":{"cpe":"cpe:2.3:a:ibm:java:1.6.0_sr9.2:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/java-1_6_0-ibm@1.6.0_sr9.2-0.4.1?upstream=java-1_6_0-ibm-1.6.0_sr9.2-0.4.1.src.rpm"}}},{"category":"product_version","name":"java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1","product":{"name":"java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1","product_id":"java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1","product_identification_helper":{"cpe":"cpe:2.3:a:ibm:java:1.6.0_sr16.0:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/java-1_6_0-ibm-alsa@1.6.0_sr16.0-0.3.1?upstream=java-1_6_0-ibm-1.6.0_sr16.0-0.3.1.src.rpm"}}},{"category":"product_version","name":"java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.4.1","product":{"name":"java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.4.1","product_id":"java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.4.1","product_identification_helper":{"cpe":"cpe:2.3:a:ibm:java:1.6.0_sr9.2:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/java-1_6_0-ibm-fonts@1.6.0_sr9.2-0.4.1?upstream=java-1_6_0-ibm-1.6.0_sr9.2-0.4.1.src.rpm"}}},{"category":"product_version","name":"java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.4.1","product":{"name":"java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.4.1","product_id":"java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.4.1","product_identification_helper":{"cpe":"cpe:2.3:a:ibm:java:1.6.0_sr9.2:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/java-1_6_0-ibm-jdbc@1.6.0_sr9.2-0.4.1?upstream=java-1_6_0-ibm-1.6.0_sr9.2-0.4.1.src.rpm"}}},{"category":"product_version","name":"java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.4.1","product":{"name":"java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.4.1","product_id":"java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.4.1","product_identification_helper":{"cpe":"cpe:2.3:a:ibm:java:1.6.0_sr9.2:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/java-1_6_0-ibm-plugin@1.6.0_sr9.2-0.4.1?upstream=java-1_6_0-ibm-1.6.0_sr9.2-0.4.1.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"java-1_4_2-ibm-1.4.2_sr13.10-0.4.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_4_2-ibm-1.4.2_sr13.10-0.4.1"},"product_reference":"java-1_4_2-ibm-1.4.2_sr13.10-0.4.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1"},"product_reference":"java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1"},"product_reference":"java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"java-1_6_0-ibm-1.6.0_sr9.2-0.4.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-1.6.0_sr9.2-0.4.1"},"product_reference":"java-1_6_0-ibm-1.6.0_sr9.2-0.4.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1"},"product_reference":"java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.4.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.4.1"},"product_reference":"java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.4.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.4.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.4.1"},"product_reference":"java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.4.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.4.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.4.1"},"product_reference":"java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.4.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"java-1_4_2-ibm-sap-1.4.2_sr13.10-0.3.1 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP1","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP1:java-1_4_2-ibm-sap-1.4.2_sr13.10-0.3.1"},"product_reference":"java-1_4_2-ibm-sap-1.4.2_sr13.10-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 11 SP1"},{"category":"default_component_of","full_product_name":{"name":"java-1_4_2-ibm-sap-devel-1.4.2_sr13.10-0.3.1 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP1","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP1:java-1_4_2-ibm-sap-devel-1.4.2_sr13.10-0.3.1"},"product_reference":"java-1_4_2-ibm-sap-devel-1.4.2_sr13.10-0.3.1","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 11 SP1"}]},"vulnerabilities":[{"cve":"CVE-2011-0862","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-0862"}],"notes":[{"category":"general","text":"Multiple unspecified vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allow remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_4_2-ibm-1.4.2_sr13.10-0.4.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-1.6.0_sr9.2-0.4.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.4.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.4.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.4.1","SUSE Linux Enterprise Server for SAP Applications 11 SP1:java-1_4_2-ibm-sap-1.4.2_sr13.10-0.3.1","SUSE Linux Enterprise Server for SAP Applications 11 SP1:java-1_4_2-ibm-sap-devel-1.4.2_sr13.10-0.3.1"]},"references":[{"category":"external","summary":"CVE-2011-0862","url":"https://www.suse.com/security/cve/CVE-2011-0862"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 698739 for CVE-2011-0862","url":"https://bugzilla.suse.com/698739"},{"category":"external","summary":"SUSE Bug 698754 for CVE-2011-0862","url":"https://bugzilla.suse.com/698754"},{"category":"external","summary":"SUSE Bug 700157 for CVE-2011-0862","url":"https://bugzilla.suse.com/700157"},{"category":"external","summary":"SUSE Bug 705423 for CVE-2011-0862","url":"https://bugzilla.suse.com/705423"},{"category":"external","summary":"SUSE Bug 707244 for CVE-2011-0862","url":"https://bugzilla.suse.com/707244"},{"category":"external","summary":"SUSE Bug 711195 for CVE-2011-0862","url":"https://bugzilla.suse.com/711195"},{"category":"external","summary":"Advisory link for SUSE-SA:2011:030","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NAHASMJVJ3C4KMENOS7PZPOM75TD63S/#7NAHASMJVJ3C4KMENOS7PZPOM75TD63S"},{"category":"external","summary":"Advisory link for SUSE-SA:2011:032","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D2BJFKENZJU7OQDK77WKSCVKAIQ6HZR7/#D2BJFKENZJU7OQDK77WKSCVKAIQ6HZR7"},{"category":"external","summary":"Advisory link for SUSE-SA:2011:036","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGKPTDQN26Z73YF7FZGG4E4HGIXNWXLJ/#MGKPTDQN26Z73YF7FZGG4E4HGIXNWXLJ"},{"category":"external","summary":"Advisory link for SUSE-SU-2011:0632-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WW3CUZCFKKNNCKEQYDORJRK67QPAT63X/#WW3CUZCFKKNNCKEQYDORJRK67QPAT63X"},{"category":"external","summary":"Advisory link for SUSE-SU-2011:0759-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QIVZYOQI4PZXT6GRICOVZTQCNCJKMRMT/#QIVZYOQI4PZXT6GRICOVZTQCNCJKMRMT"},{"category":"external","summary":"Advisory link for SUSE-SU-2011:0807-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R2YFJCQMS5MDKWANZ3CO4KRWJP5CBSF7/#R2YFJCQMS5MDKWANZ3CO4KRWJP5CBSF7"},{"category":"external","summary":"Advisory link for SUSE-SU-2011:0863-2","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VI6IQLJPWJGGPA6C5Y5DCAPS7H5SUAM4/#VI6IQLJPWJGGPA6C5Y5DCAPS7H5SUAM4"},{"category":"external","summary":"Advisory link for SUSE-SU-2011:0966-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJQWKMA2M7PLIWEWQGMGESY6LLBAPBJ/#DYJQWKMA2M7PLIWEWQGMGESY6LLBAPBJ"},{"category":"external","summary":"Advisory link for openSUSE-SU-2011:0633-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD3BFEG4YKCBVFO4X6G47JJZJBHXJN5A/#OD3BFEG4YKCBVFO4X6G47JJZJBHXJN5A"},{"category":"external","summary":"Advisory link for openSUSE-SU-2011:0706-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5KIBL4WKYJICJGD6LIF2X4Y6R2IFNXWR/#5KIBL4WKYJICJGD6LIF2X4Y6R2IFNXWR"},{"category":"external","summary":"Advisory link for openSUSE-SU-2011:0935-2","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MAPVO7VUVIC3A7DXU4QJRQ3MEVCQISHC/#MAPVO7VUVIC3A7DXU4QJRQ3MEVCQISHC"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_4_2-ibm-1.4.2_sr13.10-0.4.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-1.6.0_sr9.2-0.4.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.4.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.4.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.4.1","SUSE Linux Enterprise Server for SAP Applications 11 SP1:java-1_4_2-ibm-sap-1.4.2_sr13.10-0.3.1","SUSE Linux Enterprise Server for SAP Applications 11 SP1:java-1_4_2-ibm-sap-devel-1.4.2_sr13.10-0.3.1"]}],"threats":[{"category":"impact","date":"2013-06-28T02:29:44Z","details":"critical"}],"title":"CVE-2011-0862"}]}