<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for icedtea-web</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:1595-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-09-15T06:37:46Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-09-15T06:37:46Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-09-15T06:37:46Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for icedtea-web</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The icedtea-web java plugin was updated to 1.6.1.

Changes included:
* Enabled Entry-Point attribute check
* permissions sandbox and signed app and unsigned app with
  permissions all-permissions now run in sandbox instead of not at all.
* fixed DownloadService
* comments in deployment.properties now should persists load/save
* fixed bug in caching of files with query
* fixed issues with recreating of existing shortcut
* trustAll/trustNone now processed correctly
* headless no longer shows dialogues
* RH1231441 Unable to read the text of the buttons of the security dialogue
* Fixed RH1233697 icedtea-web: applet origin spoofing (CVE-2015-5235, bsc#944208)
* Fixed RH1233667 icedtea-web: unexpected permanent authorization of unsigned applets (CVE-2015-5234, bsc#944209)
* MissingALACAdialog made available also for unsigned applications (but ignoring actual manifest value) and fixed
* NetX
  - fixed issues with -html shortcuts
  - fixed issue with -html receiving garbage in width and height
* PolicyEditor
  - file flag made to work when used standalone
  - file flag and main argument cannot be used in combination
* Fix generation of man-pages with some versions of 'tail'

Also included is the update to 1.6
* Massively improved offline abilities. Added Xoffline switch to
  force work without inet connection.
* Improved to be able to run with any JDK
* JDK 6 and older no longer supported
* JDK 8 support added (URLPermission granted if applicable)
* JDK 9 supported 
* Added support for Entry-Point manifest attribute
* Added KEY_ENABLE_MANIFEST_ATTRIBUTES_CHECK deployment property
  to control scan of Manifest file 
* starting arguments now accept also -- abbreviations
* Added new documentation
* Added support for menu shortcuts - both javaws
  applications/applets and html applets are supported
* added support for -html switch for javaws. Now you can run most
  of the applets without browser at all
* Control Panel
  - PR1856: ControlPanel UI improvement for lower resolutions
  (800*600)
* NetX
  - PR1858: Java Console accepts multi-byte encodings
  - PR1859: Java Console UI improvement for lower resolutions
    (800*600)
  - RH1091563: [abrt] icedtea-web-1.5-2.fc20: Uncaught exception
    java.lang.ClassCastException in method
    sun.applet.PluginAppletViewer$8.run()
  - Dropped support for long unmaintained -basedir argument
  - Returned support for -jnlp argument
  - RH1095311, PR574 -  References class sun.misc.Ref removed in
    OpenJDK 9 - fixed, and so buildable on JDK9
* Plugin
  - PR1743 - Intermittant deadlock in PluginRequestProcessor
  - PR1298 - LiveConnect - problem setting array elements (applet
    variables) from JS
  - RH1121549: coverity defects
  - Resolves method overloading correctly with superclass
    heirarchy distance
* PolicyEditor
  - codebases can be renamed in-place, copied, and pasted
  - codebase URLs can be copied to system clipboard
  - displays a progress dialog while opening or saving files
  - codebases without permissions assigned save to file anyway
    (and re-appear on next open)
  - PR1776: NullPointer on save-and-exit
  - PR1850: duplicate codebases when launching from security dialogs
  - Fixed bug where clicking 'Cancel' on the 'Save before Exiting'
    dialog could result in the editor exiting without saving
    changes
  - Keyboard accelerators and mnemonics greatly improved
  - 'File - New' allows editing a new policy without first
    selecting the file to save to
* Common
  - PR1769: support signed applets which specify Sandbox
    permissions in their manifests
* Temporary Permissions in security dialog now multi-selectable
  and based on PolicyEditor permissions

- Update to 1.5.2
* NetX
  - RH1095311, PR574 -  References class sun.misc.Ref removed in
    OpenJDK 9 - fixed, and so buildable on JDK9
  - RH1154177 - decoded file needed from cache
  - fixed NPE  in https dialog
  - empty codebase behaves  as '.'
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:1595-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="icedtea-web-1.5.3-0.7.1">
      <FullProductName ProductID="icedtea-web-1.5.3-0.7.1">icedtea-web-1.5.3-0.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="icedtea-web-javadoc-1.5.3-0.7.1">
      <FullProductName ProductID="icedtea-web-javadoc-1.5.3-0.7.1">icedtea-web-javadoc-1.5.3-0.7.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x before 1.1.7, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.x before 1.4.1 allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly execute arbitrary code via a crafted webpage that triggers a heap-based buffer overflow, related to an error message and a "triggering event attached to applet." NOTE: the 1.4.x versions were originally associated with CVE-2013-4349, but that entry has been MERGED with this one.</Note>
    </Notes>
    <CVE>CVE-2012-4540</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4540.html</URL>
        <Description>CVE-2012-4540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/787846</URL>
        <Description>SUSE Bug 787846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/840572</URL>
        <Description>SUSE Bug 840572</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.</Note>
    </Notes>
    <CVE>CVE-2015-5234</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5234.html</URL>
        <Description>CVE-2015-5234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944209</URL>
        <Description>SUSE Bug 944209</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.</Note>
    </Notes>
    <CVE>CVE-2015-5235</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5235.html</URL>
        <Description>CVE-2015-5235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944208</URL>
        <Description>SUSE Bug 944208</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
