Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-2161
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Oracle Corporation | Java SE JDK and JRE |
Version: Java SE:7u291 Version: Java SE:8u281 Version: Java SE:11.0.10 Version: Java SE:16 Version: Java SE Embedded:8u281 Version: Oracle GraalVM Enterprise Edition:19.3.5 Version: Oracle GraalVM Enterprise Edition:20.3.1.2 Version: Oracle GraalVM Enterprise Edition:21.0.0.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:32:03.135Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuapr2021.html", }, { name: "[debian-lts-announce] 20210423 [SECURITY] [DLA 2634-1] openjdk-8 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html", }, { name: "DSA-4899", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2021/dsa-4899", }, { name: "FEDORA-2021-6eb9bbbf0c", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/", }, { name: "FEDORA-2021-65aa196c14", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/", }, { name: "FEDORA-2021-25b47f16af", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/", }, { name: "FEDORA-2021-8b80ef64f1", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/", }, { name: "FEDORA-2021-f71b592e07", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/", }, { name: "FEDORA-2021-b88e86b753", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20210513-0001/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", }, { name: "GLSA-202209-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202209-05", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-2161", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-26T14:44:10.262858Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-26T15:33:42.318Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Java SE JDK and JRE", vendor: "Oracle Corporation", versions: [ { status: "affected", version: "Java SE:7u291", }, { status: "affected", version: "Java SE:8u281", }, { status: "affected", version: "Java SE:11.0.10", }, { status: "affected", version: "Java SE:16", }, { status: "affected", version: "Java SE Embedded:8u281", }, { status: "affected", version: "Oracle GraalVM Enterprise Edition:19.3.5", }, { status: "affected", version: "Oracle GraalVM Enterprise Edition:20.3.1.2", }, { status: "affected", version: "Oracle GraalVM Enterprise Edition:21.0.0.2", }, ], }, ], descriptions: [ { lang: "en", value: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { description: "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data.", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-09-07T04:06:40", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuapr2021.html", }, { name: "[debian-lts-announce] 20210423 [SECURITY] [DLA 2634-1] openjdk-8 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html", }, { name: "DSA-4899", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2021/dsa-4899", }, { name: "FEDORA-2021-6eb9bbbf0c", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/", }, { name: "FEDORA-2021-65aa196c14", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/", }, { name: "FEDORA-2021-25b47f16af", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/", }, { name: "FEDORA-2021-8b80ef64f1", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/", }, { name: "FEDORA-2021-f71b592e07", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/", }, { name: "FEDORA-2021-b88e86b753", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20210513-0001/", }, { tags: [ "x_refsource_MISC", ], url: "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", }, { name: "GLSA-202209-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202209-05", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2021-2161", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Java SE JDK and JRE", version: { version_data: [ { version_affected: "=", version_value: "Java SE:7u291", }, { version_affected: "=", version_value: "Java SE:8u281", }, { version_affected: "=", version_value: "Java SE:11.0.10", }, { version_affected: "=", version_value: "Java SE:16", }, { version_affected: "=", version_value: "Java SE Embedded:8u281", }, { version_affected: "=", version_value: "Oracle GraalVM Enterprise Edition:19.3.5", }, { version_affected: "=", version_value: "Oracle GraalVM Enterprise Edition:20.3.1.2", }, { version_affected: "=", version_value: "Oracle GraalVM Enterprise Edition:21.0.0.2", }, ], }, }, ], }, vendor_name: "Oracle Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", }, ], }, impact: { cvss: { baseScore: "5.9", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data.", }, ], }, ], }, references: { reference_data: [ { name: "https://www.oracle.com/security-alerts/cpuapr2021.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuapr2021.html", }, { name: "[debian-lts-announce] 20210423 [SECURITY] [DLA 2634-1] openjdk-8 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html", }, { name: "DSA-4899", refsource: "DEBIAN", url: "https://www.debian.org/security/2021/dsa-4899", }, { name: "FEDORA-2021-6eb9bbbf0c", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/", }, { name: "FEDORA-2021-65aa196c14", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/", }, { name: "FEDORA-2021-25b47f16af", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/", }, { name: "FEDORA-2021-8b80ef64f1", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/", }, { name: "FEDORA-2021-f71b592e07", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/", }, { name: "FEDORA-2021-b88e86b753", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/", }, { name: "https://security.netapp.com/advisory/ntap-20210513-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20210513-0001/", }, { name: "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures", refsource: "MISC", url: "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", }, { name: "GLSA-202209-05", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202209-05", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2021-2161", datePublished: "2021-04-22T21:53:46", dateReserved: "2020-12-09T00:00:00", dateUpdated: "2024-09-26T15:33:42.318Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.7.0:update291:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC7644D5-EEA1-4FA8-8F5E-9C476DACF956\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.8.0:update281:*:*:*:*:*:*\", \"matchCriteriaId\": \"3484EAC9-2F68-4952-8F0B-D1B83B5956CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:11.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FCE2C42-BFFB-4E1E-9E37-07F334BA3C12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:16.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16BDD043-0138-4F9E-A369-B1AA779CA4C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.8.0:update281:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DFA7B46-AA37-4943-81A1-DF8C7F2CB038\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36D96259-24BD-44E2-96D9-78CE1D41F956\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"058C7C4B-D692-49DE-924A-C2725A8162D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"0F0434A5-F2A1-4973-917C-A95F2ABE97D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"96DD93E0-274E-4C36-99F3-EEF085E57655\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11\", \"versionEndIncluding\": \"11.0.10\", \"matchCriteriaId\": \"C5344C25-BD71-4228-903F-E419A4455F5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13\", \"versionEndIncluding\": \"13.0.6\", \"matchCriteriaId\": \"4D1453F5-ABB5-48F8-9C1C-69EEEE3949A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15\", \"versionEndIncluding\": \"15.0.2\", \"matchCriteriaId\": \"8602555C-1C07-4A4C-8DBB-5D304366A7E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"E78B7C5A-FA51-41E4-AAB0-C6DED2EFCF4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"02011EDC-20A7-4A16-A592-7C76E0037997\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC6D4652-1226-4C60-BEDF-01EBF8AC0849\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C1F9ED7-7D93-41F4-9130-15BA734420AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CF9CDF1-95D3-4125-A73F-396D2280FC4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*\", \"matchCriteriaId\": \"A13266DC-F8D9-4F30-987F-65BBEAF8D3A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*\", \"matchCriteriaId\": \"C28388AB-CFC9-4749-A90F-383F5B905EA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA1B00F9-A81C-48B7-8DAA-F394DDF323F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA7AD457-6CE6-4925-8D94-A907B40233D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6F3FDD1-7CAC-4B84-ABB7-64E9D3FBD708\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*\", \"matchCriteriaId\": \"5480E5AD-DB46-474A-9B57-84ED088A75FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*\", \"matchCriteriaId\": \"881A4AE9-6012-4E91-98BE-0A352CC20703\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E1E1079-57D9-473B-A017-964F4745F329\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8D6446E-2915-4F12-87BE-E7420BC2626E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*\", \"matchCriteriaId\": \"564EDCE3-16E6-401D-8A43-032D1F8875E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*\", \"matchCriteriaId\": \"08278802-D31B-488A-BA6A-EBC816DF883A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*\", \"matchCriteriaId\": \"72BDA05A-C8BD-472E-8465-EE1F3E5D8CF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BBB0969-565E-43E2-B067-A10AAA5F1958\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*\", \"matchCriteriaId\": \"D78BE95D-6270-469A-8035-FCDDB398F952\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*\", \"matchCriteriaId\": \"88C24F40-3150-4584-93D9-8307DE04EEE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0FC5A03-FF11-4787-BBF1-3ACF93A21F2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*\", \"matchCriteriaId\": \"19626B36-62FC-4497-A2E1-7D6CD9839B19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*\", \"matchCriteriaId\": \"5713AEBD-35F6-44E8-A0CC-A42830D7AE20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BE0C04B-440E-4B35-ACC8-6264514F764C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*\", \"matchCriteriaId\": \"555EC2A6-0475-48ED-AE0C-B306714A9333\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC1CF2AD-3F7A-4EF3-BD41-117A21553A9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*\", \"matchCriteriaId\": \"02C55E2E-AEDE-455C-B128-168C918B5D97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*\", \"matchCriteriaId\": \"81831D37-6597-441B-87DE-38F7191BEA42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEA1594D-0AB5-436D-9E60-C26EE2175753\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*\", \"matchCriteriaId\": \"B868FA41-C71B-491C-880B-484740B30C72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C242D3BE-9114-4A9E-BB78-45754C7CC450\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*\", \"matchCriteriaId\": \"D61068FE-18EE-4ADB-BC69-A3ECE8724575\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFB59E80-4EC4-4399-BF40-6733E4E475A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*\", \"matchCriteriaId\": \"84E31265-22E1-4E91-BFCB-D2AFF445926A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB3A58C3-94BB-4120-BE1D-AAF8BBF7F22B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*\", \"matchCriteriaId\": \"50319E52-8739-47C5-B61E-3CA9B6A9A48F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ED515B9-DC74-4DC5-B98A-08D87D85E11E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D1D4868-1F9F-43F7-968C-6469B67D3F1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*\", \"matchCriteriaId\": \"568F1AC4-B0D7-4438-82E5-0E61500F2240\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5E99B4A-EDAD-4471-81C4-7E9C775C9D9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*\", \"matchCriteriaId\": \"14E9133E-9FF3-40DB-9A11-7469EF5FD265\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*\", \"matchCriteriaId\": \"94834710-3FA9-49D9-8600-B514CBCA4270\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*\", \"matchCriteriaId\": \"4228D9E1-7D82-4B49-9669-9CDAD7187432\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6231F48-2936-4F7D-96D5-4BA11F78EBE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*\", \"matchCriteriaId\": \"D96D5061-4A81-497E-9AD6-A8381B3B454C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*\", \"matchCriteriaId\": \"5345C21E-A01B-43B9-9A20-F2783D921C60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*\", \"matchCriteriaId\": \"B219F360-83BD-4111-AB59-C9D4F55AF4C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*\", \"matchCriteriaId\": \"D25377EA-8E8F-4C76-8EA9-3BBDFB352815\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*\", \"matchCriteriaId\": \"59FEFE05-269A-4EAF-A80F-E4C2107B1197\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7E2AA7C-F602-4DB7-9EC1-0708C46C253C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB70E154-A304-429E-80F5-8D87B00E32D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"70892D06-6E75-4425-BBF0-4B684EC62A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*\", \"matchCriteriaId\": \"7417B2BB-9AC2-4AF4-A828-C89A0735AD92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A0A57B5-6F88-4288-9CDE-F6613FE068D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*\", \"matchCriteriaId\": \"67ED8559-C348-4932-B7CE-CB96976A30EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*\", \"matchCriteriaId\": \"40AC3D91-263F-4345-9FAA-0E573EA64590\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD92AFA9-81F8-48D4-B79A-E7F066F69A99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C4B2F24-A730-4818-90C8-A2D90C081F03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*\", \"matchCriteriaId\": \"464087F2-C285-4574-957E-CE0663F07DE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E9BB880-A4F6-4887-8BB9-47AA298753D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*\", \"matchCriteriaId\": \"18DCFF53-B298-4534-AB5C-8A5EF59C616F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*\", \"matchCriteriaId\": \"083419F8-FDDF-4E36-88F8-857DB317C1D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7A74F65-57E8-4C9A-BA96-5EF401504F13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D0B90FC-57B6-4315-9B29-3C36E58B2CF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*\", \"matchCriteriaId\": \"07812576-3C35-404C-A7D7-9BE9E3D76E00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*\", \"matchCriteriaId\": \"00C52B1C-5447-4282-9667-9EBE0720B423\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*\", \"matchCriteriaId\": \"92BB9EB0-0C12-4E77-89EE-FB77097841B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABC0E7BB-F8B7-4369-9910-71240E4073A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*\", \"matchCriteriaId\": \"551B2640-8CEC-4C24-AF8B-7A7CEF864D9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AE30779-48FB-451E-8CE1-F469F93B8772\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*\", \"matchCriteriaId\": \"60590FDE-7156-4314-A012-AA38BD2ADDC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE51AD3A-8331-4E8F-9DB1-7A0051731DFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*\", \"matchCriteriaId\": \"F24F6122-2256-41B6-9033-794C6424ED99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EAFA79E-8C7A-48CF-8868-11378FE4B26F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1D6F19F-59B5-4BB6-AD35-013384025970\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7BA97BC-3ADA-465A-835B-6C3C5F416B56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*\", \"matchCriteriaId\": \"B71F77A4-B7EB-47A1-AAFD-431A7D040B86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*\", \"matchCriteriaId\": \"91D6BEA9-5943-44A4-946D-CEAA9BA99376\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*\", \"matchCriteriaId\": \"C079A3E0-44EB-4B9C-B4FC-B7621D165C3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CB74086-14B8-4237-8357-E0C6B5BB8313\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*\", \"matchCriteriaId\": \"00C2B9C9-1177-4DA6-96CE-55F37F383F99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*\", \"matchCriteriaId\": \"435CF189-0BD8-40DF-A0DC-99862CDEAF8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*\", \"matchCriteriaId\": \"12A3F367-33AD-47C3-BFDC-871A17E72C94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*\", \"matchCriteriaId\": \"A18F994F-72CA-4AF5-A7D1-9F5AEA286D85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*\", \"matchCriteriaId\": \"78261932-7373-4F16-91E0-1A72ADBEBC3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BD90D3D-9B3A-4101-9A8A-5090F0A9719F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*\", \"matchCriteriaId\": \"B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5A40B8A-D428-4008-9F21-AF21394C51D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEC5B777-01E1-45EE-AF95-C3BD1F098B2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B504718-5DCE-43B4-B19A-C6B6E7444BD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*\", \"matchCriteriaId\": \"3102AA10-99A8-49A9-867E-7EEC56865680\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A55CBC7-A7B2-4B89-8AB5-ED30DBE6814E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8483034-DD5A-445D-892F-CDE90A7D58EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*\", \"matchCriteriaId\": \"8279718F-878F-4868-8859-1728D13CD0D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C024E1A-FD2C-42E8-B227-C2AFD3040436\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F24389D-DDD0-4204-AA24-31C920A4F47E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*\", \"matchCriteriaId\": \"966979BE-1F21-4729-B6B8-610F74648344\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8534265-33BF-460D-BF74-5F55FDE50F29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*\", \"matchCriteriaId\": \"F77AFC25-1466-4E56-9D5F-6988F3288E16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*\", \"matchCriteriaId\": \"A650BEB8-E56F-4E42-9361-8D2DB083F0F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*\", \"matchCriteriaId\": \"799FFECD-E80A-44B3-953D-CDB5E195F3AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7047507-7CAF-4A14-AA9A-5CEF806EDE98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFC7B179-95D3-4F94-84F6-73F1034A1AF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FB28526-9385-44CA-AF08-1899E6C3AE4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*\", \"matchCriteriaId\": \"E26B69E4-0B43-415F-A82B-52FDCB262B3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*\", \"matchCriteriaId\": \"27BC4150-70EC-462B-8FC5-20B3442CBB31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*\", \"matchCriteriaId\": \"02646989-ECD9-40AE-A83E-EFF4080C69B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCFB65CD-98D5-4024-86CF-130D70DC5A5F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\", \"matchCriteriaId\": \"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"B55E8D50-99B4-47EC-86F9-699B67D473CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3C19813-E823-456A-B1CE-EC0684CE1953\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD7447BC-F315-4298-A822-549942FC118B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02DEB4FB-A21D-4CB1-B522-EEE5093E8521\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"5.10.0\", \"matchCriteriaId\": \"A30F7908-5AF6-4761-BC6A-4C18EFAE48E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F30D3AF-4FA3-4B7A-BE04-C24E2EA19A95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B00DDE7-7002-45BE-8EDE-65D964922CB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB88C165-BB24-49FB-AAF6-087A766D5AD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF806B52-DAD5-4D12-8BB6-3CBF9DC6B8DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DE847E0-431D-497D-9C57-C4E59749F6A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"46385384-5561-40AA-9FDE-A2DE4FDFAD3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7CA7CA6-7CF2-48F6-81B5-69BA0A37EF4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E4E5481-1070-4E1F-8679-1985DE4E785A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9EEA681-67FF-43B3-8610-0FA17FD279E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*\", \"matchCriteriaId\": \"C33BA8EA-793D-4E79-BE9C-235ACE717216\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*\", \"matchCriteriaId\": \"823DBE80-CB8D-4981-AE7C-28F3FDD40451\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en el producto Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Libraries). Las versiones compatibles que est\\u00e1n afectadas son Java SE: 7u291, 8u281, 11.0.10, 16; Java SE integrado: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 y 21.0.0.2. La vulnerabilidad dif\\u00edcil de explotar permite a un atacante no autenticado con acceso a la red por medio de m\\u00faltiples protocolos comprometer a Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Los ataques con \\u00e9xito de esta vulnerabilidad pueden resultar en la creaci\\u00f3n, eliminaci\\u00f3n o modificaci\\u00f3n no autorizada del acceso a datos cr\\u00edticos o todos los datos accesibles de Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se aplica a las implementaciones de Java que cargan y ejecutan c\\u00f3digo que no es confiable (p. Ej., c\\u00f3digo que proviene de Internet) y conf\\u00eda en el sandbox de Java para la seguridad. Tambi\\u00e9n puede ser explotado proporcionando datos no confiables a las API en el Componente especificado. CVSS 3.1 Puntuaci\\u00f3n Base 5.9 (Impactos en la Integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)\"}]", id: "CVE-2021-2161", lastModified: "2024-11-21T06:02:30.543", metrics: "{\"cvssMetricV31\": [{\"source\": \"secalert_us@oracle.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2021-04-22T22:15:13.037", references: "[{\"url\": \"https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content&id=SB10366\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/\", \"source\": \"secalert_us@oracle.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/\", \"source\": \"secalert_us@oracle.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/\", \"source\": \"secalert_us@oracle.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/\", \"source\": \"secalert_us@oracle.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/\", \"source\": \"secalert_us@oracle.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/\", \"source\": \"secalert_us@oracle.com\"}, {\"url\": \"https://security.gentoo.org/glsa/202209-05\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210513-0001/\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2021/dsa-4899\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2021.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content&id=SB10366\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202209-05\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210513-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2021/dsa-4899\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]", sourceIdentifier: "secalert_us@oracle.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2021-2161\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2021-04-22T22:15:13.037\",\"lastModified\":\"2024-11-21T06:02:30.543\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el producto Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Libraries). Las versiones compatibles que están afectadas son Java SE: 7u291, 8u281, 11.0.10, 16; Java SE integrado: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 y 21.0.0.2. La vulnerabilidad difícil de explotar permite a un atacante no autenticado con acceso a la red por medio de múltiples protocolos comprometer a Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Los ataques con éxito de esta vulnerabilidad pueden resultar en la creación, eliminación o modificación no autorizada del acceso a datos críticos o todos los datos accesibles de Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se aplica a las implementaciones de Java que cargan y ejecutan código que no es confiable (p. Ej., código que proviene de Internet) y confía en el sandbox de Java para la seguridad. También puede ser explotado proporcionando datos no confiables a las API en el Componente especificado. CVSS 3.1 Puntuación Base 5.9 (Impactos en la Integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert_us@oracle.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update291:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC7644D5-EEA1-4FA8-8F5E-9C476DACF956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.8.0:update281:*:*:*:*:*:*\",\"matchCriteriaId\":\"3484EAC9-2F68-4952-8F0B-D1B83B5956CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:11.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FCE2C42-BFFB-4E1E-9E37-07F334BA3C12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:16.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16BDD043-0138-4F9E-A369-B1AA779CA4C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.8.0:update281:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DFA7B46-AA37-4943-81A1-DF8C7F2CB038\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"058C7C4B-D692-49DE-924A-C2725A8162D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"0F0434A5-F2A1-4973-917C-A95F2ABE97D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"96DD93E0-274E-4C36-99F3-EEF085E57655\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11\",\"versionEndIncluding\":\"11.0.10\",\"matchCriteriaId\":\"C5344C25-BD71-4228-903F-E419A4455F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13\",\"versionEndIncluding\":\"13.0.6\",\"matchCriteriaId\":\"4D1453F5-ABB5-48F8-9C1C-69EEEE3949A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15\",\"versionEndIncluding\":\"15.0.2\",\"matchCriteriaId\":\"8602555C-1C07-4A4C-8DBB-5D304366A7E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E78B7C5A-FA51-41E4-AAB0-C6DED2EFCF4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"02011EDC-20A7-4A16-A592-7C76E0037997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC6D4652-1226-4C60-BEDF-01EBF8AC0849\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C1F9ED7-7D93-41F4-9130-15BA734420AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF9CDF1-95D3-4125-A73F-396D2280FC4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*\",\"matchCriteriaId\":\"A13266DC-F8D9-4F30-987F-65BBEAF8D3A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*\",\"matchCriteriaId\":\"C28388AB-CFC9-4749-A90F-383F5B905EA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1B00F9-A81C-48B7-8DAA-F394DDF323F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7AD457-6CE6-4925-8D94-A907B40233D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F3FDD1-7CAC-4B84-ABB7-64E9D3FBD708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*\",\"matchCriteriaId\":\"5480E5AD-DB46-474A-9B57-84ED088A75FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*\",\"matchCriteriaId\":\"881A4AE9-6012-4E91-98BE-0A352CC20703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1E1079-57D9-473B-A017-964F4745F329\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D6446E-2915-4F12-87BE-E7420BC2626E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*\",\"matchCriteriaId\":\"564EDCE3-16E6-401D-8A43-032D1F8875E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*\",\"matchCriteriaId\":\"08278802-D31B-488A-BA6A-EBC816DF883A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BDA05A-C8BD-472E-8465-EE1F3E5D8CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BBB0969-565E-43E2-B067-A10AAA5F1958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*\",\"matchCriteriaId\":\"D78BE95D-6270-469A-8035-FCDDB398F952\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*\",\"matchCriteriaId\":\"88C24F40-3150-4584-93D9-8307DE04EEE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0FC5A03-FF11-4787-BBF1-3ACF93A21F2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*\",\"matchCriteriaId\":\"19626B36-62FC-4497-A2E1-7D6CD9839B19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*\",\"matchCriteriaId\":\"5713AEBD-35F6-44E8-A0CC-A42830D7AE20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BE0C04B-440E-4B35-ACC8-6264514F764C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"555EC2A6-0475-48ED-AE0C-B306714A9333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC1CF2AD-3F7A-4EF3-BD41-117A21553A9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*\",\"matchCriteriaId\":\"02C55E2E-AEDE-455C-B128-168C918B5D97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*\",\"matchCriteriaId\":\"81831D37-6597-441B-87DE-38F7191BEA42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEA1594D-0AB5-436D-9E60-C26EE2175753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*\",\"matchCriteriaId\":\"B868FA41-C71B-491C-880B-484740B30C72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C242D3BE-9114-4A9E-BB78-45754C7CC450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61068FE-18EE-4ADB-BC69-A3ECE8724575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFB59E80-4EC4-4399-BF40-6733E4E475A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E31265-22E1-4E91-BFCB-D2AFF445926A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3A58C3-94BB-4120-BE1D-AAF8BBF7F22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*\",\"matchCriteriaId\":\"50319E52-8739-47C5-B61E-3CA9B6A9A48F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED515B9-DC74-4DC5-B98A-08D87D85E11E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D1D4868-1F9F-43F7-968C-6469B67D3F1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*\",\"matchCriteriaId\":\"568F1AC4-B0D7-4438-82E5-0E61500F2240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5E99B4A-EDAD-4471-81C4-7E9C775C9D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*\",\"matchCriteriaId\":\"14E9133E-9FF3-40DB-9A11-7469EF5FD265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"94834710-3FA9-49D9-8600-B514CBCA4270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*\",\"matchCriteriaId\":\"4228D9E1-7D82-4B49-9669-9CDAD7187432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6231F48-2936-4F7D-96D5-4BA11F78EBE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*\",\"matchCriteriaId\":\"D96D5061-4A81-497E-9AD6-A8381B3B454C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*\",\"matchCriteriaId\":\"5345C21E-A01B-43B9-9A20-F2783D921C60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"B219F360-83BD-4111-AB59-C9D4F55AF4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*\",\"matchCriteriaId\":\"D25377EA-8E8F-4C76-8EA9-3BBDFB352815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*\",\"matchCriteriaId\":\"59FEFE05-269A-4EAF-A80F-E4C2107B1197\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7E2AA7C-F602-4DB7-9EC1-0708C46C253C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB70E154-A304-429E-80F5-8D87B00E32D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"70892D06-6E75-4425-BBF0-4B684EC62A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7417B2BB-9AC2-4AF4-A828-C89A0735AD92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A0A57B5-6F88-4288-9CDE-F6613FE068D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*\",\"matchCriteriaId\":\"67ED8559-C348-4932-B7CE-CB96976A30EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*\",\"matchCriteriaId\":\"40AC3D91-263F-4345-9FAA-0E573EA64590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD92AFA9-81F8-48D4-B79A-E7F066F69A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4B2F24-A730-4818-90C8-A2D90C081F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*\",\"matchCriteriaId\":\"464087F2-C285-4574-957E-CE0663F07DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E9BB880-A4F6-4887-8BB9-47AA298753D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*\",\"matchCriteriaId\":\"18DCFF53-B298-4534-AB5C-8A5EF59C616F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*\",\"matchCriteriaId\":\"083419F8-FDDF-4E36-88F8-857DB317C1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A74F65-57E8-4C9A-BA96-5EF401504F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D0B90FC-57B6-4315-9B29-3C36E58B2CF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*\",\"matchCriteriaId\":\"07812576-3C35-404C-A7D7-9BE9E3D76E00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C52B1C-5447-4282-9667-9EBE0720B423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BB9EB0-0C12-4E77-89EE-FB77097841B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABC0E7BB-F8B7-4369-9910-71240E4073A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*\",\"matchCriteriaId\":\"551B2640-8CEC-4C24-AF8B-7A7CEF864D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AE30779-48FB-451E-8CE1-F469F93B8772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*\",\"matchCriteriaId\":\"60590FDE-7156-4314-A012-AA38BD2ADDC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE51AD3A-8331-4E8F-9DB1-7A0051731DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*\",\"matchCriteriaId\":\"F24F6122-2256-41B6-9033-794C6424ED99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EAFA79E-8C7A-48CF-8868-11378FE4B26F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1D6F19F-59B5-4BB6-AD35-013384025970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7BA97BC-3ADA-465A-835B-6C3C5F416B56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71F77A4-B7EB-47A1-AAFD-431A7D040B86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*\",\"matchCriteriaId\":\"91D6BEA9-5943-44A4-946D-CEAA9BA99376\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*\",\"matchCriteriaId\":\"C079A3E0-44EB-4B9C-B4FC-B7621D165C3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CB74086-14B8-4237-8357-E0C6B5BB8313\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C2B9C9-1177-4DA6-96CE-55F37F383F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*\",\"matchCriteriaId\":\"435CF189-0BD8-40DF-A0DC-99862CDEAF8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A3F367-33AD-47C3-BFDC-871A17E72C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*\",\"matchCriteriaId\":\"A18F994F-72CA-4AF5-A7D1-9F5AEA286D85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*\",\"matchCriteriaId\":\"78261932-7373-4F16-91E0-1A72ADBEBC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD90D3D-9B3A-4101-9A8A-5090F0A9719F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A40B8A-D428-4008-9F21-AF21394C51D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC5B777-01E1-45EE-AF95-C3BD1F098B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B504718-5DCE-43B4-B19A-C6B6E7444BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*\",\"matchCriteriaId\":\"3102AA10-99A8-49A9-867E-7EEC56865680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A55CBC7-A7B2-4B89-8AB5-ED30DBE6814E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8483034-DD5A-445D-892F-CDE90A7D58EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*\",\"matchCriteriaId\":\"8279718F-878F-4868-8859-1728D13CD0D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C024E1A-FD2C-42E8-B227-C2AFD3040436\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F24389D-DDD0-4204-AA24-31C920A4F47E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*\",\"matchCriteriaId\":\"966979BE-1F21-4729-B6B8-610F74648344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8534265-33BF-460D-BF74-5F55FDE50F29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*\",\"matchCriteriaId\":\"F77AFC25-1466-4E56-9D5F-6988F3288E16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*\",\"matchCriteriaId\":\"A650BEB8-E56F-4E42-9361-8D2DB083F0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*\",\"matchCriteriaId\":\"799FFECD-E80A-44B3-953D-CDB5E195F3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7047507-7CAF-4A14-AA9A-5CEF806EDE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC7B179-95D3-4F94-84F6-73F1034A1AF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FB28526-9385-44CA-AF08-1899E6C3AE4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*\",\"matchCriteriaId\":\"E26B69E4-0B43-415F-A82B-52FDCB262B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*\",\"matchCriteriaId\":\"27BC4150-70EC-462B-8FC5-20B3442CBB31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*\",\"matchCriteriaId\":\"02646989-ECD9-40AE-A83E-EFF4080C69B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCFB65CD-98D5-4024-86CF-130D70DC5A5F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02DEB4FB-A21D-4CB1-B522-EEE5093E8521\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.10.0\",\"matchCriteriaId\":\"A30F7908-5AF6-4761-BC6A-4C18EFAE48E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F30D3AF-4FA3-4B7A-BE04-C24E2EA19A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B00DDE7-7002-45BE-8EDE-65D964922CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB88C165-BB24-49FB-AAF6-087A766D5AD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF806B52-DAD5-4D12-8BB6-3CBF9DC6B8DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DE847E0-431D-497D-9C57-C4E59749F6A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"46385384-5561-40AA-9FDE-A2DE4FDFAD3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7CA7CA6-7CF2-48F6-81B5-69BA0A37EF4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E4E5481-1070-4E1F-8679-1985DE4E785A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9EEA681-67FF-43B3-8610-0FA17FD279E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33BA8EA-793D-4E79-BE9C-235ACE717216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"823DBE80-CB8D-4981-AE7C-28F3FDD40451\"}]}]}],\"references\":[{\"url\":\"https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content&id=SB10366\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://security.gentoo.org/glsa/202209-05\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210513-0001/\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4899\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2021.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content&id=SB10366\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202209-05\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210513-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4899\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}", vulnrichment: { containers: "{\"cna\": {\"affected\": [{\"product\": \"Java SE JDK and JRE\", \"vendor\": \"Oracle Corporation\", \"versions\": [{\"status\": \"affected\", \"version\": \"Java SE:7u291\"}, {\"status\": \"affected\", \"version\": \"Java SE:8u281\"}, {\"status\": \"affected\", \"version\": \"Java SE:11.0.10\"}, {\"status\": \"affected\", \"version\": \"Java SE:16\"}, {\"status\": \"affected\", \"version\": \"Java SE Embedded:8u281\"}, {\"status\": \"affected\", \"version\": \"Oracle GraalVM Enterprise Edition:19.3.5\"}, {\"status\": \"affected\", \"version\": \"Oracle GraalVM Enterprise Edition:20.3.1.2\"}, {\"status\": \"affected\", \"version\": \"Oracle GraalVM Enterprise Edition:21.0.0.2\"}]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"NONE\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"version\": \"3.1\"}}], \"problemTypes\": [{\"descriptions\": [{\"description\": \"Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data.\", \"lang\": \"en\", \"type\": \"text\"}]}], \"providerMetadata\": {\"dateUpdated\": \"2022-09-07T04:06:40\", \"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\"}, \"references\": [{\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://www.oracle.com/security-alerts/cpuapr2021.html\"}, {\"name\": \"[debian-lts-announce] 20210423 [SECURITY] [DLA 2634-1] openjdk-8 security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html\"}, {\"name\": \"DSA-4899\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"], \"url\": \"https://www.debian.org/security/2021/dsa-4899\"}, {\"name\": \"FEDORA-2021-6eb9bbbf0c\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/\"}, {\"name\": \"FEDORA-2021-65aa196c14\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/\"}, {\"name\": \"FEDORA-2021-25b47f16af\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/\"}, {\"name\": \"FEDORA-2021-8b80ef64f1\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/\"}, {\"name\": \"FEDORA-2021-f71b592e07\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/\"}, {\"name\": \"FEDORA-2021-b88e86b753\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://security.netapp.com/advisory/ntap-20210513-0001/\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content&id=SB10366\"}, {\"name\": \"GLSA-202209-05\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"], \"url\": \"https://security.gentoo.org/glsa/202209-05\"}], \"x_legacyV4Record\": {\"CVE_data_meta\": {\"ASSIGNER\": \"secalert_us@oracle.com\", \"ID\": \"CVE-2021-2161\", \"STATE\": \"PUBLIC\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"product_name\": \"Java SE JDK and JRE\", \"version\": {\"version_data\": [{\"version_affected\": \"=\", \"version_value\": \"Java SE:7u291\"}, {\"version_affected\": \"=\", \"version_value\": \"Java SE:8u281\"}, {\"version_affected\": \"=\", \"version_value\": \"Java SE:11.0.10\"}, {\"version_affected\": \"=\", \"version_value\": \"Java SE:16\"}, {\"version_affected\": \"=\", \"version_value\": \"Java SE Embedded:8u281\"}, {\"version_affected\": \"=\", \"version_value\": \"Oracle GraalVM Enterprise Edition:19.3.5\"}, {\"version_affected\": \"=\", \"version_value\": \"Oracle GraalVM Enterprise Edition:20.3.1.2\"}, {\"version_affected\": \"=\", \"version_value\": \"Oracle GraalVM Enterprise Edition:21.0.0.2\"}]}}]}, \"vendor_name\": \"Oracle Corporation\"}]}}, \"data_format\": \"MITRE\", \"data_type\": \"CVE\", \"data_version\": \"4.0\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).\"}]}, \"impact\": {\"cvss\": {\"baseScore\": \"5.9\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"version\": \"3.1\"}}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data.\"}]}]}, \"references\": {\"reference_data\": [{\"name\": \"https://www.oracle.com/security-alerts/cpuapr2021.html\", \"refsource\": \"MISC\", \"url\": \"https://www.oracle.com/security-alerts/cpuapr2021.html\"}, {\"name\": \"[debian-lts-announce] 20210423 [SECURITY] [DLA 2634-1] openjdk-8 security update\", \"refsource\": \"MLIST\", \"url\": \"https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html\"}, {\"name\": \"DSA-4899\", \"refsource\": \"DEBIAN\", \"url\": \"https://www.debian.org/security/2021/dsa-4899\"}, {\"name\": \"FEDORA-2021-6eb9bbbf0c\", \"refsource\": \"FEDORA\", \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/\"}, {\"name\": \"FEDORA-2021-65aa196c14\", \"refsource\": \"FEDORA\", \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/\"}, {\"name\": \"FEDORA-2021-25b47f16af\", \"refsource\": \"FEDORA\", \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/\"}, {\"name\": \"FEDORA-2021-8b80ef64f1\", \"refsource\": \"FEDORA\", \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/\"}, {\"name\": \"FEDORA-2021-f71b592e07\", \"refsource\": \"FEDORA\", \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/\"}, {\"name\": \"FEDORA-2021-b88e86b753\", \"refsource\": \"FEDORA\", \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/\"}, {\"name\": \"https://security.netapp.com/advisory/ntap-20210513-0001/\", \"refsource\": \"CONFIRM\", \"url\": \"https://security.netapp.com/advisory/ntap-20210513-0001/\"}, {\"name\": \"https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures\", \"refsource\": \"MISC\", \"url\": \"https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures\"}, {\"name\": \"https://kc.mcafee.com/corporate/index?page=content&id=SB10366\", \"refsource\": \"CONFIRM\", \"url\": \"https://kc.mcafee.com/corporate/index?page=content&id=SB10366\"}, {\"name\": \"GLSA-202209-05\", \"refsource\": \"GENTOO\", \"url\": \"https://security.gentoo.org/glsa/202209-05\"}]}}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T16:32:03.135Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://www.oracle.com/security-alerts/cpuapr2021.html\"}, {\"name\": \"[debian-lts-announce] 20210423 [SECURITY] [DLA 2634-1] openjdk-8 security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html\"}, {\"name\": \"DSA-4899\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"], \"url\": \"https://www.debian.org/security/2021/dsa-4899\"}, {\"name\": \"FEDORA-2021-6eb9bbbf0c\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/\"}, {\"name\": \"FEDORA-2021-65aa196c14\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/\"}, {\"name\": \"FEDORA-2021-25b47f16af\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/\"}, {\"name\": \"FEDORA-2021-8b80ef64f1\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/\"}, {\"name\": \"FEDORA-2021-f71b592e07\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/\"}, {\"name\": \"FEDORA-2021-b88e86b753\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://security.netapp.com/advisory/ntap-20210513-0001/\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content&id=SB10366\"}, {\"name\": \"GLSA-202209-05\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"], \"url\": \"https://security.gentoo.org/glsa/202209-05\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-2161\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-26T14:44:10.262858Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-26T14:44:37.113Z\"}}]}", cveMetadata: "{\"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"assignerShortName\": \"oracle\", \"cveId\": \"CVE-2021-2161\", \"datePublished\": \"2021-04-22T21:53:46\", \"dateReserved\": \"2020-12-09T00:00:00\", \"dateUpdated\": \"2024-09-26T15:33:42.318Z\", \"state\": \"PUBLISHED\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
WID-SEC-W-2023-1125
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "IBM Java Runtime ist die Java Runtime Environment (kurz JRE) Portierung von IBM.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM Java ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1125 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2023-1125.json", }, { category: "self", summary: "WID-SEC-2023-1125 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1125", }, { category: "external", summary: "IBM Security Bulletin 6987743 vom 2023-05-02", url: "https://www.ibm.com/support/pages/node/6987743", }, { category: "external", summary: "IBM Security Bulletin: CVE-2021-2161 vom 2021-05-30", url: "https://www.ibm.com/support/pages/node/6454459", }, ], source_lang: "en-US", title: "IBM Java: Schwachstelle ermöglicht nicht spezifizierten Angriff", tracking: { current_release_date: "2023-05-02T22:00:00.000+00:00", generator: { date: "2024-08-15T17:50:15.659+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1125", initial_release_date: "2021-05-30T22:00:00.000+00:00", revision_history: [ { date: "2021-05-30T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-05-02T22:00:00.000+00:00", number: "2", summary: "Neue Updates von IBM aufgenommen", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "IBM Java < 7.0.10.85", product: { name: "IBM Java < 7.0.10.85", product_id: "T019437", product_identification_helper: { cpe: "cpe:/a:ibm:jre:7.0.10.85", }, }, }, { category: "product_name", name: "IBM Java < 7.1.4.85", product: { name: "IBM Java < 7.1.4.85", product_id: "T019438", product_identification_helper: { cpe: "cpe:/a:ibm:jre:7.1.4.85", }, }, }, { category: "product_name", name: "IBM Java < 8.0.6.30", product: { name: "IBM Java < 8.0.6.30", product_id: "T019439", product_identification_helper: { cpe: "cpe:/a:ibm:jre:8.0.6.30", }, }, }, { category: "product_name", name: "IBM Java < 11.0.11.0", product: { name: "IBM Java < 11.0.11.0", product_id: "T019440", product_identification_helper: { cpe: "cpe:/a:ibm:jre:11.0.11.0", }, }, }, ], category: "product_name", name: "Java", }, { category: "product_name", name: "IBM Spectrum Scale 1.1.8.0 - 1.1.8.4", product: { name: "IBM Spectrum Scale 1.1.8.0 - 1.1.8.4", product_id: "T027575", product_identification_helper: { cpe: "cpe:/a:ibm:spectrum_scale:1.1.8.0_-_1.1.8.4", }, }, }, ], category: "vendor", name: "IBM", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in IBM Java. Der Fehler besteht in der Komponente \"Libraries\". Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen nicht spezifizierten Angriff mit hohen Auswirkungen auf die Integrität durchzuführen.", }, ], product_status: { known_affected: [ "T027575", ], }, release_date: "2021-05-30T22:00:00.000+00:00", title: "CVE-2021-2161", }, ], }
wid-sec-w-2022-1303
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).\r\nGraalVM ist eine universelle virtuelle Maschine zum Ausführen von Anwendungen, die in JavaScript, Python, Ruby, R, JVM-basierten Sprachen wie Java, Scala, Groovy, Kotlin, Clojure und LLVM-basierten Sprachen wie C und C++ geschrieben wurden.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE und Oracle GraalVM ausnutzen, um die Verfügbarkeit, Vertraulichkeit und Integrität zu gefährden.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- Sonstiges\n- Hardware Appliance", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1303 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-1303.json", }, { category: "self", summary: "WID-SEC-2022-1303 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1303", }, { category: "external", summary: "F5 Security Advisory K71522481 vom 2022-12-07", url: "https://support.f5.com/csp/article/K71522481", }, { category: "external", summary: "AVAYA Security Advisory ASA-2021-040 vom 2021-05-07", url: "https://downloads.avaya.com/css/P8/documents/101075694", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:1554-1 vom 2021-05-11", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-May/008756.html", }, { category: "external", summary: "Hitachi Vulnerability Information HITACHI-SEC-2021-115 vom 2021-05-14", url: "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2021-115/index.html", }, { category: "external", summary: "XEROX Security Advisory XRX21-008 vom 2021-05-19", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2021/05/cert_XRX21-008_FFPSv7-S10_DvdUsb-Bulletin_May2021.pdf", }, { category: "external", summary: "XEROX Security Advisory XRX21-009 vom 2021-05-19", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2021/05/cert_XRX21-009_FFPSv9-S10_DvdUsb-Bulletin_May2021.pdf", }, { category: "external", summary: "Oracle Critical Patch Update Advisory - April 2021 - Appendix Oracle Java SE vom 2021-04-20", url: "https://www.oracle.com/security-alerts/cpuapr2021.html#AppendixJAVA", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1297 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1297", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1298 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1298", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1299 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1299", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1301 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1301", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1305 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1305", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1306 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1306", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1307 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1307", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-1298 vom 2021-04-21", url: "https://linux.oracle.com/errata/ELSA-2021-1298.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-1297 vom 2021-04-21", url: "https://linux.oracle.com/errata/ELSA-2021-1297.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-1307 vom 2021-04-21", url: "https://linux.oracle.com/errata/ELSA-2021-1307.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-1301 vom 2021-04-21", url: "https://linux.oracle.com/errata/ELSA-2021-1301.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1315 vom 2021-04-21", url: "https://access.redhat.com/errata/RHSA-2021:1315", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2021-65AA196C14 vom 2021-04-22", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2021-65aa196c14", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2021-8B80EF64F1 vom 2021-04-22", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2021-8b80ef64f1", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2021-6EB9BBBF0C vom 2021-04-22", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2021-6eb9bbbf0c", }, { category: "external", summary: "Debian Security Advisory DLA-2634 vom 2021-04-23", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html", }, { category: "external", summary: "Debian Security Advisory DSA-4899 vom 2021-04-24", url: "https://www.debian.org/security/2021/dsa-4899", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:1314-1 vom 2021-04-26", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008676.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4892-1 vom 2021-04-27", url: "https://ubuntu.com/security/notices/USN-4892-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1447 vom 2021-04-28", url: "https://access.redhat.com/errata/RHSA-2021:1447", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1446 vom 2021-04-28", url: "https://access.redhat.com/errata/RHSA-2021:1446", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1445 vom 2021-04-28", url: "https://access.redhat.com/errata/RHSA-2021:1445", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1444 vom 2021-04-28", url: "https://access.redhat.com/errata/RHSA-2021:1444", }, { category: "external", summary: "CentOS Security Advisory CESA-2021:1297 vom 2021-04-30", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2021-1297-Moderate-CentOS-7-java-11-openjdk-Security-Update-tp4646173.html", }, { category: "external", summary: "CentOS Security Advisory CESA-2021:1298 vom 2021-04-30", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2021-1298-Moderate-CentOS-7-java-1-8-0-openjdk-Security-Update-tp4646174.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2021-034 vom 2021-05-03", url: "https://downloads.avaya.com/css/P8/documents/101075625", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1429 vom 2021-05-05", url: "https://access.redhat.com/errata/RHSA-2021:1429", }, { category: "external", summary: "AVAYA Security Advisory ASA-2021-032 vom 2021-05-04", url: "https://downloads.avaya.com/css/P8/documents/101075638", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:1980-1 vom 2021-06-15", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009020.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:1989-1 vom 2021-06-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009025.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2021-1515 vom 2021-07-13", url: "https://alas.aws.amazon.com/ALAS-2021-1515.html", }, { category: "external", summary: "Juniper Security Advisory JSA11206 vom 2021-07-14", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11206&cat=SIRT_1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:2797-1 vom 2021-08-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:2798-1 vom 2021-08-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3007-1 vom 2021-09-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0108-1 vom 2022-01-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:14876-1 vom 2022-01-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0107-1 vom 2022-01-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:14875-1 vom 2022-01-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010014.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0166-1 vom 2022-01-24", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202209-05 vom 2022-09-07", url: "https://security.gentoo.org/glsa/202209-05", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:6755 vom 2022-09-29", url: "https://access.redhat.com/errata/RHSA-2022:6755", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:6756 vom 2022-09-29", url: "https://access.redhat.com/errata/RHSA-2022:6756", }, { category: "external", summary: "HCL Article KB0100876 vom 2022-10-06", url: "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0100876", }, { category: "external", summary: "IBM Security Bulletin 6827849 vom 2022-10-08", url: "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-txseries-for-multiplatforms-is-vulnerable-to-no-confidentiality-impact-high-integrity-impact-and-no-availability-impact-cve-2021-2163/", }, { category: "external", summary: "Trellix Knowledge Center", url: "https://kcm.trellix.com/corporate/index?page=content&id=SB10366", }, { category: "external", summary: "IBM Security Bulletin 6837645 vom 2022-11-08", url: "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-affect-ibm-tivoli-monitoring-included-websphere-application-server-and-ibm-http-server-used-by-websphere-application-server-3/", }, ], source_lang: "en-US", title: "Oracle Java SE: Mehrere Schwachstellen", tracking: { current_release_date: "2022-12-06T23:00:00.000+00:00", generator: { date: "2024-08-15T17:34:36.314+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-1303", initial_release_date: "2021-04-20T22:00:00.000+00:00", revision_history: [ { date: "2021-04-20T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2021-04-21T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Oracle Linux und Red Hat aufgenommen", }, { date: "2021-04-22T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Fedora aufgenommen", }, { date: "2021-04-25T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Fedora und Debian aufgenommen", }, { date: "2021-04-26T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-04-27T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2021-04-28T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-05-02T22:00:00.000+00:00", number: "8", summary: "Neue Updates von CentOS aufgenommen", }, { date: "2021-05-04T22:00:00.000+00:00", number: "9", summary: "Neue Updates von AVAYA und Red Hat aufgenommen", }, { date: "2021-05-05T22:00:00.000+00:00", number: "10", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2021-05-09T22:00:00.000+00:00", number: "11", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2021-05-10T22:00:00.000+00:00", number: "12", summary: "Betroffene Produkte von Avaya nachgetragen", }, { date: "2021-05-11T22:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-05-13T22:00:00.000+00:00", number: "14", summary: "Neue Updates von HITACHI aufgenommen", }, { date: "2021-05-19T22:00:00.000+00:00", number: "15", summary: "Neue Updates von XEROX aufgenommen", }, { date: "2021-06-15T22:00:00.000+00:00", number: "16", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-06-17T22:00:00.000+00:00", number: "17", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-07-12T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2021-07-14T22:00:00.000+00:00", number: "19", summary: "Neue Updates von Juniper aufgenommen", }, { date: "2021-08-22T22:00:00.000+00:00", number: "20", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-09-09T22:00:00.000+00:00", number: "21", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-01-18T23:00:00.000+00:00", number: "22", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-01-19T23:00:00.000+00:00", number: "23", summary: "Korrektur", }, { date: "2022-01-24T23:00:00.000+00:00", number: "24", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-09-06T22:00:00.000+00:00", number: "25", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-09-29T22:00:00.000+00:00", number: "26", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-10-06T22:00:00.000+00:00", number: "27", summary: "Neue Updates von HCL aufgenommen", }, { date: "2022-10-09T22:00:00.000+00:00", number: "28", summary: "Neue Updates von IBM aufgenommen", }, { date: "2022-10-30T23:00:00.000+00:00", number: "29", summary: "Neue Updates aufgenommen", }, { date: "2022-11-07T23:00:00.000+00:00", number: "30", summary: "Neue Updates von IBM aufgenommen", }, { date: "2022-11-10T23:00:00.000+00:00", number: "31", summary: "Referenz(en) aufgenommen:", }, { date: "2022-12-06T23:00:00.000+00:00", number: "32", summary: "Neue Updates von F5 aufgenommen", }, ], status: "final", version: "32", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, { category: "product_name", name: "Avaya Session Border Controller", product: { name: "Avaya Session Border Controller", product_id: "T015520", product_identification_helper: { cpe: "cpe:/h:avaya:session_border_controller:-", }, }, }, { category: "product_name", name: "Avaya Web License Manager", product: { name: "Avaya Web License Manager", product_id: "T016243", product_identification_helper: { cpe: "cpe:/a:avaya:web_license_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "F5 BIG-IP", product: { name: "F5 BIG-IP", product_id: "T001663", product_identification_helper: { cpe: "cpe:/a:f5:big-ip:-", }, }, }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "HCL BigFix", product: { name: "HCL BigFix", product_id: "T017494", product_identification_helper: { cpe: "cpe:/a:hcltech:bigfix:-", }, }, }, ], category: "vendor", name: "HCL", }, { branches: [ { category: "product_name", name: "Hitachi Command Suite", product: { name: "Hitachi Command Suite", product_id: "T010951", product_identification_helper: { cpe: "cpe:/a:hitachi:command_suite:-", }, }, }, ], category: "vendor", name: "Hitachi", }, { branches: [ { branches: [ { category: "product_name", name: "IBM TXSeries 9.1", product: { name: "IBM TXSeries 9.1", product_id: "T015903", product_identification_helper: { cpe: "cpe:/a:ibm:txseries:for_multiplatforms_9.1", }, }, }, { category: "product_name", name: "IBM TXSeries 8.2", product: { name: "IBM TXSeries 8.2", product_id: "T015904", product_identification_helper: { cpe: "cpe:/a:ibm:txseries:for_multiplatforms_8.2", }, }, }, ], category: "product_name", name: "TXSeries", }, { category: "product_name", name: "IBM Tivoli Monitoring", product: { name: "IBM Tivoli Monitoring", product_id: "T000066", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6", }, }, }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "Juniper JUNOS", product: { name: "Juniper JUNOS", product_id: "5930", product_identification_helper: { cpe: "cpe:/o:juniper:junos:-", }, }, }, ], category: "vendor", name: "Juniper", }, { branches: [ { category: "product_name", name: "Open Source CentOS", product: { name: "Open Source CentOS", product_id: "1727", product_identification_helper: { cpe: "cpe:/o:centos:centos:-", }, }, }, { branches: [ { category: "product_name", name: "Open Source OpenJDK 1.8.0", product: { name: "Open Source OpenJDK 1.8.0", product_id: "185976", product_identification_helper: { cpe: "cpe:/a:oracle:openjdk:1.8.0", }, }, }, { category: "product_name", name: "Open Source OpenJDK 11", product: { name: "Open Source OpenJDK 11", product_id: "711976", product_identification_helper: { cpe: "cpe:/a:oracle:openjdk:11", }, }, }, ], category: "product_name", name: "OpenJDK", }, ], category: "vendor", name: "Open Source", }, { branches: [ { branches: [ { category: "product_name", name: "Oracle GraalVM 19.3.5", product: { name: "Oracle GraalVM 19.3.5", product_id: "T019021", product_identification_helper: { cpe: "cpe:/a:oracle:graalvm:19.3.5::enterprise", }, }, }, { category: "product_name", name: "Oracle GraalVM 20.3.1.2", product: { name: "Oracle GraalVM 20.3.1.2", product_id: "T019022", product_identification_helper: { cpe: "cpe:/a:oracle:graalvm:20.3.1.2::enterprise", }, }, }, { category: "product_name", name: "Oracle GraalVM 21.0.0.2", product: { name: "Oracle GraalVM 21.0.0.2", product_id: "T019023", product_identification_helper: { cpe: "cpe:/a:oracle:graalvm:21.0.0.2::enterprise", }, }, }, ], category: "product_name", name: "GraalVM", }, { branches: [ { category: "product_name", name: "Oracle Java SE 7u291", product: { name: "Oracle Java SE 7u291", product_id: "T019005", product_identification_helper: { cpe: "cpe:/a:oracle:java_se:7u291", }, }, }, { category: "product_name", name: "Oracle Java SE 8u281", product: { name: "Oracle Java SE 8u281", product_id: "T019006", product_identification_helper: { cpe: "cpe:/a:oracle:java_se:8u281", }, }, }, { category: "product_name", name: "Oracle Java SE 11.0.10", product: { name: "Oracle Java SE 11.0.10", product_id: "T019007", product_identification_helper: { cpe: "cpe:/a:oracle:java_se:11.0.10", }, }, }, { category: "product_name", name: "Oracle Java SE 16", product: { name: "Oracle Java SE 16", product_id: "T019008", product_identification_helper: { cpe: "cpe:/a:oracle:java_se:16", }, }, }, ], category: "product_name", name: "Java SE", }, { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "T015361", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Trellix ePolicy Orchestrator < 5.10 CU 11", product: { name: "Trellix ePolicy Orchestrator < 5.10 CU 11", product_id: "T024888", product_identification_helper: { cpe: "cpe:/a:trellix:epolicy_orchestrator:5.10_update_14", }, }, }, ], category: "vendor", name: "Trellix", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, { branches: [ { category: "product_name", name: "Xerox FreeFlow Print Server 7", product: { name: "Xerox FreeFlow Print Server 7", product_id: "T000872", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:7", }, }, }, ], category: "vendor", name: "Xerox", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", notes: [ { category: "description", text: "In Oracle Java SE und Oracle GraalVM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" über alle Schwachstellen aggregiert und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015904", "T015903", "711976", "T010951", "T015127", "T015126", "T004914", "T015520", "T017494", "T015361", "T024888", "T000872", "5930", "T001663", "398363", "185976", "T015519", "T015518", "T015516", "T019021", "T012167", "T019023", "T019022", "T016243", "T019005", "T019007", "T019006", "2951", "T002207", "T019008", "T000126", "T000066", "1727", ], }, release_date: "2021-04-20T22:00:00.000+00:00", title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", notes: [ { category: "description", text: "In Oracle Java SE und Oracle GraalVM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" über alle Schwachstellen aggregiert und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015904", "T015903", "711976", "T010951", "T015127", "T015126", "T004914", "T015520", "T017494", "T015361", "T024888", "T000872", "5930", "T001663", "398363", "185976", "T015519", "T015518", "T015516", "T019021", "T012167", "T019023", "T019022", "T016243", "T019005", "T019007", "T019006", "2951", "T002207", "T019008", "T000126", "T000066", "1727", ], }, release_date: "2021-04-20T22:00:00.000+00:00", title: "CVE-2021-2163", }, { cve: "CVE-2021-23841", notes: [ { category: "description", text: "In Oracle Java SE und Oracle GraalVM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" über alle Schwachstellen aggregiert und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015904", "T015903", "711976", "T010951", "T015127", "T015126", "T004914", "T015520", "T017494", "T015361", "T024888", "T000872", "5930", "T001663", "398363", "185976", "T015519", "T015518", "T015516", "T019021", "T012167", "T019023", "T019022", "T016243", "T019005", "T019007", "T019006", "2951", "T002207", "T019008", "T000126", "T000066", "1727", ], }, release_date: "2021-04-20T22:00:00.000+00:00", title: "CVE-2021-23841", }, { cve: "CVE-2021-3450", notes: [ { category: "description", text: "In Oracle Java SE und Oracle GraalVM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" über alle Schwachstellen aggregiert und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015904", "T015903", "711976", "T010951", "T015127", "T015126", "T004914", "T015520", "T017494", "T015361", "T024888", "T000872", "5930", "T001663", "398363", "185976", "T015519", "T015518", "T015516", "T019021", "T012167", "T019023", "T019022", "T016243", "T019005", "T019007", "T019006", "2951", "T002207", "T019008", "T000126", "T000066", "1727", ], }, release_date: "2021-04-20T22:00:00.000+00:00", title: "CVE-2021-3450", }, ], }
wid-sec-w-2023-1125
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "IBM Java Runtime ist die Java Runtime Environment (kurz JRE) Portierung von IBM.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM Java ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1125 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2023-1125.json", }, { category: "self", summary: "WID-SEC-2023-1125 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1125", }, { category: "external", summary: "IBM Security Bulletin 6987743 vom 2023-05-02", url: "https://www.ibm.com/support/pages/node/6987743", }, { category: "external", summary: "IBM Security Bulletin: CVE-2021-2161 vom 2021-05-30", url: "https://www.ibm.com/support/pages/node/6454459", }, ], source_lang: "en-US", title: "IBM Java: Schwachstelle ermöglicht nicht spezifizierten Angriff", tracking: { current_release_date: "2023-05-02T22:00:00.000+00:00", generator: { date: "2024-08-15T17:50:15.659+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1125", initial_release_date: "2021-05-30T22:00:00.000+00:00", revision_history: [ { date: "2021-05-30T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-05-02T22:00:00.000+00:00", number: "2", summary: "Neue Updates von IBM aufgenommen", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "IBM Java < 7.0.10.85", product: { name: "IBM Java < 7.0.10.85", product_id: "T019437", product_identification_helper: { cpe: "cpe:/a:ibm:jre:7.0.10.85", }, }, }, { category: "product_name", name: "IBM Java < 7.1.4.85", product: { name: "IBM Java < 7.1.4.85", product_id: "T019438", product_identification_helper: { cpe: "cpe:/a:ibm:jre:7.1.4.85", }, }, }, { category: "product_name", name: "IBM Java < 8.0.6.30", product: { name: "IBM Java < 8.0.6.30", product_id: "T019439", product_identification_helper: { cpe: "cpe:/a:ibm:jre:8.0.6.30", }, }, }, { category: "product_name", name: "IBM Java < 11.0.11.0", product: { name: "IBM Java < 11.0.11.0", product_id: "T019440", product_identification_helper: { cpe: "cpe:/a:ibm:jre:11.0.11.0", }, }, }, ], category: "product_name", name: "Java", }, { category: "product_name", name: "IBM Spectrum Scale 1.1.8.0 - 1.1.8.4", product: { name: "IBM Spectrum Scale 1.1.8.0 - 1.1.8.4", product_id: "T027575", product_identification_helper: { cpe: "cpe:/a:ibm:spectrum_scale:1.1.8.0_-_1.1.8.4", }, }, }, ], category: "vendor", name: "IBM", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in IBM Java. Der Fehler besteht in der Komponente \"Libraries\". Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen nicht spezifizierten Angriff mit hohen Auswirkungen auf die Integrität durchzuführen.", }, ], product_status: { known_affected: [ "T027575", ], }, release_date: "2021-05-30T22:00:00.000+00:00", title: "CVE-2021-2161", }, ], }
wid-sec-w-2023-0016
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Tivoli Monitoring ist eine Systemüberwachungs-Software zum Managen von Betriebssystemen, Datenbanken und Servern in verteilten und Host-Umgebungen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Tivoli Monitoring ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0016 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0016.json", }, { category: "self", summary: "WID-SEC-2023-0016 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0016", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6587154", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6472877", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6466307", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6466303", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6438833", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6376752", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6252467", }, ], source_lang: "en-US", title: "IBM Tivoli Monitoring: Mehrere Schwachstellen", tracking: { current_release_date: "2023-01-03T23:00:00.000+00:00", generator: { date: "2024-08-15T17:40:42.367+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0016", initial_release_date: "2023-01-03T23:00:00.000+00:00", revision_history: [ { date: "2023-01-03T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0", product: { name: "IBM Tivoli Monitoring 6.3.0", product_id: "307523", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.1", product: { name: "IBM Tivoli Monitoring 6.3.0.1", product_id: "307524", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.1", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.2", product: { name: "IBM Tivoli Monitoring 6.3.0.2", product_id: "307525", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.2", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.3", product: { name: "IBM Tivoli Monitoring 6.3.0.3", product_id: "307526", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.3", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.4", product: { name: "IBM Tivoli Monitoring 6.3.0.4", product_id: "307527", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.4", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.5", product: { name: "IBM Tivoli Monitoring 6.3.0.5", product_id: "342006", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.5", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.6", product: { name: "IBM Tivoli Monitoring 6.3.0.6", product_id: "342007", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.6", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.7", product: { name: "IBM Tivoli Monitoring 6.3.0.7", product_id: "342008", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.7", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring for Virtual Environments", product: { name: "IBM Tivoli Monitoring for Virtual Environments", product_id: "T025737", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:::for_virtual_environments", }, }, }, ], category: "product_name", name: "Tivoli Monitoring", }, ], category: "vendor", name: "IBM", }, ], }, vulnerabilities: [ { cve: "CVE-2022-22965", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2022-22965", }, { cve: "CVE-2021-2161", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2021-2161", }, { cve: "CVE-2020-2830", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2830", }, { cve: "CVE-2020-2805", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2805", }, { cve: "CVE-2020-2803", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2803", }, { cve: "CVE-2020-2800", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2800", }, { cve: "CVE-2020-2781", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2781", }, { cve: "CVE-2020-2773", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2773", }, { cve: "CVE-2020-2757", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2757", }, { cve: "CVE-2020-2756", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2756", }, { cve: "CVE-2020-2755", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2755", }, { cve: "CVE-2020-2754", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2754", }, { cve: "CVE-2020-27221", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-27221", }, { cve: "CVE-2020-2654", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2654", }, { cve: "CVE-2020-2601", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2601", }, { cve: "CVE-2020-2590", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2590", }, { cve: "CVE-2020-14803", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14803", }, { cve: "CVE-2020-14798", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14798", }, { cve: "CVE-2020-14797", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14797", }, { cve: "CVE-2020-14796", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14796", }, { cve: "CVE-2020-14792", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14792", }, { cve: "CVE-2020-14782", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14782", }, { cve: "CVE-2020-14781", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14781", }, { cve: "CVE-2020-14779", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14779", }, { cve: "CVE-2020-14621", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14621", }, { cve: "CVE-2020-14593", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14593", }, { cve: "CVE-2020-14583", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14583", }, { cve: "CVE-2020-14581", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14581", }, { cve: "CVE-2020-14579", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14579", }, { cve: "CVE-2020-14578", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14578", }, { cve: "CVE-2020-14577", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14577", }, { cve: "CVE-2020-14556", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14556", }, { cve: "CVE-2019-2949", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2019-2949", }, { cve: "CVE-2019-17639", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2019-17639", }, ], }
WID-SEC-W-2023-0016
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Tivoli Monitoring ist eine Systemüberwachungs-Software zum Managen von Betriebssystemen, Datenbanken und Servern in verteilten und Host-Umgebungen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Tivoli Monitoring ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0016 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0016.json", }, { category: "self", summary: "WID-SEC-2023-0016 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0016", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6587154", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6472877", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6466307", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6466303", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6438833", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6376752", }, { category: "external", summary: "IBM Security Bulletin vom 2023-01-03", url: "https://www.ibm.com/support/pages/node/6252467", }, ], source_lang: "en-US", title: "IBM Tivoli Monitoring: Mehrere Schwachstellen", tracking: { current_release_date: "2023-01-03T23:00:00.000+00:00", generator: { date: "2024-08-15T17:40:42.367+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0016", initial_release_date: "2023-01-03T23:00:00.000+00:00", revision_history: [ { date: "2023-01-03T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0", product: { name: "IBM Tivoli Monitoring 6.3.0", product_id: "307523", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.1", product: { name: "IBM Tivoli Monitoring 6.3.0.1", product_id: "307524", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.1", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.2", product: { name: "IBM Tivoli Monitoring 6.3.0.2", product_id: "307525", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.2", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.3", product: { name: "IBM Tivoli Monitoring 6.3.0.3", product_id: "307526", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.3", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.4", product: { name: "IBM Tivoli Monitoring 6.3.0.4", product_id: "307527", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.4", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.5", product: { name: "IBM Tivoli Monitoring 6.3.0.5", product_id: "342006", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.5", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.6", product: { name: "IBM Tivoli Monitoring 6.3.0.6", product_id: "342007", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.6", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring 6.3.0.7", product: { name: "IBM Tivoli Monitoring 6.3.0.7", product_id: "342008", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6.3.0.7", }, }, }, { category: "product_name", name: "IBM Tivoli Monitoring for Virtual Environments", product: { name: "IBM Tivoli Monitoring for Virtual Environments", product_id: "T025737", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:::for_virtual_environments", }, }, }, ], category: "product_name", name: "Tivoli Monitoring", }, ], category: "vendor", name: "IBM", }, ], }, vulnerabilities: [ { cve: "CVE-2022-22965", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2022-22965", }, { cve: "CVE-2021-2161", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2021-2161", }, { cve: "CVE-2020-2830", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2830", }, { cve: "CVE-2020-2805", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2805", }, { cve: "CVE-2020-2803", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2803", }, { cve: "CVE-2020-2800", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2800", }, { cve: "CVE-2020-2781", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2781", }, { cve: "CVE-2020-2773", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2773", }, { cve: "CVE-2020-2757", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2757", }, { cve: "CVE-2020-2756", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2756", }, { cve: "CVE-2020-2755", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2755", }, { cve: "CVE-2020-2754", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2754", }, { cve: "CVE-2020-27221", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-27221", }, { cve: "CVE-2020-2654", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2654", }, { cve: "CVE-2020-2601", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2601", }, { cve: "CVE-2020-2590", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-2590", }, { cve: "CVE-2020-14803", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14803", }, { cve: "CVE-2020-14798", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14798", }, { cve: "CVE-2020-14797", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14797", }, { cve: "CVE-2020-14796", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14796", }, { cve: "CVE-2020-14792", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14792", }, { cve: "CVE-2020-14782", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14782", }, { cve: "CVE-2020-14781", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14781", }, { cve: "CVE-2020-14779", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14779", }, { cve: "CVE-2020-14621", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14621", }, { cve: "CVE-2020-14593", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14593", }, { cve: "CVE-2020-14583", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14583", }, { cve: "CVE-2020-14581", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14581", }, { cve: "CVE-2020-14579", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14579", }, { cve: "CVE-2020-14578", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14578", }, { cve: "CVE-2020-14577", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14577", }, { cve: "CVE-2020-14556", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2020-14556", }, { cve: "CVE-2019-2949", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2019-2949", }, { cve: "CVE-2019-17639", notes: [ { category: "description", text: "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle über das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", }, ], product_status: { known_affected: [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006", ], }, release_date: "2023-01-03T23:00:00.000+00:00", title: "CVE-2019-17639", }, ], }
WID-SEC-W-2022-1303
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).\r\nGraalVM ist eine universelle virtuelle Maschine zum Ausführen von Anwendungen, die in JavaScript, Python, Ruby, R, JVM-basierten Sprachen wie Java, Scala, Groovy, Kotlin, Clojure und LLVM-basierten Sprachen wie C und C++ geschrieben wurden.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE und Oracle GraalVM ausnutzen, um die Verfügbarkeit, Vertraulichkeit und Integrität zu gefährden.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- Sonstiges\n- Hardware Appliance", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1303 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-1303.json", }, { category: "self", summary: "WID-SEC-2022-1303 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1303", }, { category: "external", summary: "F5 Security Advisory K71522481 vom 2022-12-07", url: "https://support.f5.com/csp/article/K71522481", }, { category: "external", summary: "AVAYA Security Advisory ASA-2021-040 vom 2021-05-07", url: "https://downloads.avaya.com/css/P8/documents/101075694", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:1554-1 vom 2021-05-11", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-May/008756.html", }, { category: "external", summary: "Hitachi Vulnerability Information HITACHI-SEC-2021-115 vom 2021-05-14", url: "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2021-115/index.html", }, { category: "external", summary: "XEROX Security Advisory XRX21-008 vom 2021-05-19", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2021/05/cert_XRX21-008_FFPSv7-S10_DvdUsb-Bulletin_May2021.pdf", }, { category: "external", summary: "XEROX Security Advisory XRX21-009 vom 2021-05-19", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2021/05/cert_XRX21-009_FFPSv9-S10_DvdUsb-Bulletin_May2021.pdf", }, { category: "external", summary: "Oracle Critical Patch Update Advisory - April 2021 - Appendix Oracle Java SE vom 2021-04-20", url: "https://www.oracle.com/security-alerts/cpuapr2021.html#AppendixJAVA", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1297 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1297", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1298 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1298", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1299 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1299", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1301 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1301", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1305 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1305", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1306 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1306", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1307 vom 2021-04-20", url: "https://access.redhat.com/errata/RHSA-2021:1307", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-1298 vom 2021-04-21", url: "https://linux.oracle.com/errata/ELSA-2021-1298.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-1297 vom 2021-04-21", url: "https://linux.oracle.com/errata/ELSA-2021-1297.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-1307 vom 2021-04-21", url: "https://linux.oracle.com/errata/ELSA-2021-1307.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-1301 vom 2021-04-21", url: "https://linux.oracle.com/errata/ELSA-2021-1301.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1315 vom 2021-04-21", url: "https://access.redhat.com/errata/RHSA-2021:1315", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2021-65AA196C14 vom 2021-04-22", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2021-65aa196c14", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2021-8B80EF64F1 vom 2021-04-22", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2021-8b80ef64f1", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2021-6EB9BBBF0C vom 2021-04-22", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2021-6eb9bbbf0c", }, { category: "external", summary: "Debian Security Advisory DLA-2634 vom 2021-04-23", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html", }, { category: "external", summary: "Debian Security Advisory DSA-4899 vom 2021-04-24", url: "https://www.debian.org/security/2021/dsa-4899", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:1314-1 vom 2021-04-26", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008676.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4892-1 vom 2021-04-27", url: "https://ubuntu.com/security/notices/USN-4892-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1447 vom 2021-04-28", url: "https://access.redhat.com/errata/RHSA-2021:1447", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1446 vom 2021-04-28", url: "https://access.redhat.com/errata/RHSA-2021:1446", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1445 vom 2021-04-28", url: "https://access.redhat.com/errata/RHSA-2021:1445", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1444 vom 2021-04-28", url: "https://access.redhat.com/errata/RHSA-2021:1444", }, { category: "external", summary: "CentOS Security Advisory CESA-2021:1297 vom 2021-04-30", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2021-1297-Moderate-CentOS-7-java-11-openjdk-Security-Update-tp4646173.html", }, { category: "external", summary: "CentOS Security Advisory CESA-2021:1298 vom 2021-04-30", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2021-1298-Moderate-CentOS-7-java-1-8-0-openjdk-Security-Update-tp4646174.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2021-034 vom 2021-05-03", url: "https://downloads.avaya.com/css/P8/documents/101075625", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1429 vom 2021-05-05", url: "https://access.redhat.com/errata/RHSA-2021:1429", }, { category: "external", summary: "AVAYA Security Advisory ASA-2021-032 vom 2021-05-04", url: "https://downloads.avaya.com/css/P8/documents/101075638", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:1980-1 vom 2021-06-15", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009020.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:1989-1 vom 2021-06-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009025.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2021-1515 vom 2021-07-13", url: "https://alas.aws.amazon.com/ALAS-2021-1515.html", }, { category: "external", summary: "Juniper Security Advisory JSA11206 vom 2021-07-14", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11206&cat=SIRT_1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:2797-1 vom 2021-08-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:2798-1 vom 2021-08-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3007-1 vom 2021-09-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0108-1 vom 2022-01-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:14876-1 vom 2022-01-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0107-1 vom 2022-01-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:14875-1 vom 2022-01-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010014.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0166-1 vom 2022-01-24", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202209-05 vom 2022-09-07", url: "https://security.gentoo.org/glsa/202209-05", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:6755 vom 2022-09-29", url: "https://access.redhat.com/errata/RHSA-2022:6755", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:6756 vom 2022-09-29", url: "https://access.redhat.com/errata/RHSA-2022:6756", }, { category: "external", summary: "HCL Article KB0100876 vom 2022-10-06", url: "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0100876", }, { category: "external", summary: "IBM Security Bulletin 6827849 vom 2022-10-08", url: "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-txseries-for-multiplatforms-is-vulnerable-to-no-confidentiality-impact-high-integrity-impact-and-no-availability-impact-cve-2021-2163/", }, { category: "external", summary: "Trellix Knowledge Center", url: "https://kcm.trellix.com/corporate/index?page=content&id=SB10366", }, { category: "external", summary: "IBM Security Bulletin 6837645 vom 2022-11-08", url: "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-affect-ibm-tivoli-monitoring-included-websphere-application-server-and-ibm-http-server-used-by-websphere-application-server-3/", }, ], source_lang: "en-US", title: "Oracle Java SE: Mehrere Schwachstellen", tracking: { current_release_date: "2022-12-06T23:00:00.000+00:00", generator: { date: "2024-08-15T17:34:36.314+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-1303", initial_release_date: "2021-04-20T22:00:00.000+00:00", revision_history: [ { date: "2021-04-20T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2021-04-21T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Oracle Linux und Red Hat aufgenommen", }, { date: "2021-04-22T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Fedora aufgenommen", }, { date: "2021-04-25T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Fedora und Debian aufgenommen", }, { date: "2021-04-26T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-04-27T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2021-04-28T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-05-02T22:00:00.000+00:00", number: "8", summary: "Neue Updates von CentOS aufgenommen", }, { date: "2021-05-04T22:00:00.000+00:00", number: "9", summary: "Neue Updates von AVAYA und Red Hat aufgenommen", }, { date: "2021-05-05T22:00:00.000+00:00", number: "10", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2021-05-09T22:00:00.000+00:00", number: "11", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2021-05-10T22:00:00.000+00:00", number: "12", summary: "Betroffene Produkte von Avaya nachgetragen", }, { date: "2021-05-11T22:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-05-13T22:00:00.000+00:00", number: "14", summary: "Neue Updates von HITACHI aufgenommen", }, { date: "2021-05-19T22:00:00.000+00:00", number: "15", summary: "Neue Updates von XEROX aufgenommen", }, { date: "2021-06-15T22:00:00.000+00:00", number: "16", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-06-17T22:00:00.000+00:00", number: "17", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-07-12T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2021-07-14T22:00:00.000+00:00", number: "19", summary: "Neue Updates von Juniper aufgenommen", }, { date: "2021-08-22T22:00:00.000+00:00", number: "20", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-09-09T22:00:00.000+00:00", number: "21", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-01-18T23:00:00.000+00:00", number: "22", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-01-19T23:00:00.000+00:00", number: "23", summary: "Korrektur", }, { date: "2022-01-24T23:00:00.000+00:00", number: "24", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-09-06T22:00:00.000+00:00", number: "25", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-09-29T22:00:00.000+00:00", number: "26", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-10-06T22:00:00.000+00:00", number: "27", summary: "Neue Updates von HCL aufgenommen", }, { date: "2022-10-09T22:00:00.000+00:00", number: "28", summary: "Neue Updates von IBM aufgenommen", }, { date: "2022-10-30T23:00:00.000+00:00", number: "29", summary: "Neue Updates aufgenommen", }, { date: "2022-11-07T23:00:00.000+00:00", number: "30", summary: "Neue Updates von IBM aufgenommen", }, { date: "2022-11-10T23:00:00.000+00:00", number: "31", summary: "Referenz(en) aufgenommen:", }, { date: "2022-12-06T23:00:00.000+00:00", number: "32", summary: "Neue Updates von F5 aufgenommen", }, ], status: "final", version: "32", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, { category: "product_name", name: "Avaya Session Border Controller", product: { name: "Avaya Session Border Controller", product_id: "T015520", product_identification_helper: { cpe: "cpe:/h:avaya:session_border_controller:-", }, }, }, { category: "product_name", name: "Avaya Web License Manager", product: { name: "Avaya Web License Manager", product_id: "T016243", product_identification_helper: { cpe: "cpe:/a:avaya:web_license_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "F5 BIG-IP", product: { name: "F5 BIG-IP", product_id: "T001663", product_identification_helper: { cpe: "cpe:/a:f5:big-ip:-", }, }, }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "HCL BigFix", product: { name: "HCL BigFix", product_id: "T017494", product_identification_helper: { cpe: "cpe:/a:hcltech:bigfix:-", }, }, }, ], category: "vendor", name: "HCL", }, { branches: [ { category: "product_name", name: "Hitachi Command Suite", product: { name: "Hitachi Command Suite", product_id: "T010951", product_identification_helper: { cpe: "cpe:/a:hitachi:command_suite:-", }, }, }, ], category: "vendor", name: "Hitachi", }, { branches: [ { branches: [ { category: "product_name", name: "IBM TXSeries 9.1", product: { name: "IBM TXSeries 9.1", product_id: "T015903", product_identification_helper: { cpe: "cpe:/a:ibm:txseries:for_multiplatforms_9.1", }, }, }, { category: "product_name", name: "IBM TXSeries 8.2", product: { name: "IBM TXSeries 8.2", product_id: "T015904", product_identification_helper: { cpe: "cpe:/a:ibm:txseries:for_multiplatforms_8.2", }, }, }, ], category: "product_name", name: "TXSeries", }, { category: "product_name", name: "IBM Tivoli Monitoring", product: { name: "IBM Tivoli Monitoring", product_id: "T000066", product_identification_helper: { cpe: "cpe:/a:ibm:tivoli_monitoring:6", }, }, }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "Juniper JUNOS", product: { name: "Juniper JUNOS", product_id: "5930", product_identification_helper: { cpe: "cpe:/o:juniper:junos:-", }, }, }, ], category: "vendor", name: "Juniper", }, { branches: [ { category: "product_name", name: "Open Source CentOS", product: { name: "Open Source CentOS", product_id: "1727", product_identification_helper: { cpe: "cpe:/o:centos:centos:-", }, }, }, { branches: [ { category: "product_name", name: "Open Source OpenJDK 1.8.0", product: { name: "Open Source OpenJDK 1.8.0", product_id: "185976", product_identification_helper: { cpe: "cpe:/a:oracle:openjdk:1.8.0", }, }, }, { category: "product_name", name: "Open Source OpenJDK 11", product: { name: "Open Source OpenJDK 11", product_id: "711976", product_identification_helper: { cpe: "cpe:/a:oracle:openjdk:11", }, }, }, ], category: "product_name", name: "OpenJDK", }, ], category: "vendor", name: "Open Source", }, { branches: [ { branches: [ { category: "product_name", name: "Oracle GraalVM 19.3.5", product: { name: "Oracle GraalVM 19.3.5", product_id: "T019021", product_identification_helper: { cpe: "cpe:/a:oracle:graalvm:19.3.5::enterprise", }, }, }, { category: "product_name", name: "Oracle GraalVM 20.3.1.2", product: { name: "Oracle GraalVM 20.3.1.2", product_id: "T019022", product_identification_helper: { cpe: "cpe:/a:oracle:graalvm:20.3.1.2::enterprise", }, }, }, { category: "product_name", name: "Oracle GraalVM 21.0.0.2", product: { name: "Oracle GraalVM 21.0.0.2", product_id: "T019023", product_identification_helper: { cpe: "cpe:/a:oracle:graalvm:21.0.0.2::enterprise", }, }, }, ], category: "product_name", name: "GraalVM", }, { branches: [ { category: "product_name", name: "Oracle Java SE 7u291", product: { name: "Oracle Java SE 7u291", product_id: "T019005", product_identification_helper: { cpe: "cpe:/a:oracle:java_se:7u291", }, }, }, { category: "product_name", name: "Oracle Java SE 8u281", product: { name: "Oracle Java SE 8u281", product_id: "T019006", product_identification_helper: { cpe: "cpe:/a:oracle:java_se:8u281", }, }, }, { category: "product_name", name: "Oracle Java SE 11.0.10", product: { name: "Oracle Java SE 11.0.10", product_id: "T019007", product_identification_helper: { cpe: "cpe:/a:oracle:java_se:11.0.10", }, }, }, { category: "product_name", name: "Oracle Java SE 16", product: { name: "Oracle Java SE 16", product_id: "T019008", product_identification_helper: { cpe: "cpe:/a:oracle:java_se:16", }, }, }, ], category: "product_name", name: "Java SE", }, { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "T015361", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Trellix ePolicy Orchestrator < 5.10 CU 11", product: { name: "Trellix ePolicy Orchestrator < 5.10 CU 11", product_id: "T024888", product_identification_helper: { cpe: "cpe:/a:trellix:epolicy_orchestrator:5.10_update_14", }, }, }, ], category: "vendor", name: "Trellix", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, { branches: [ { category: "product_name", name: "Xerox FreeFlow Print Server 7", product: { name: "Xerox FreeFlow Print Server 7", product_id: "T000872", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:7", }, }, }, ], category: "vendor", name: "Xerox", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", notes: [ { category: "description", text: "In Oracle Java SE und Oracle GraalVM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" über alle Schwachstellen aggregiert und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015904", "T015903", "711976", "T010951", "T015127", "T015126", "T004914", "T015520", "T017494", "T015361", "T024888", "T000872", "5930", "T001663", "398363", "185976", "T015519", "T015518", "T015516", "T019021", "T012167", "T019023", "T019022", "T016243", "T019005", "T019007", "T019006", "2951", "T002207", "T019008", "T000126", "T000066", "1727", ], }, release_date: "2021-04-20T22:00:00.000+00:00", title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", notes: [ { category: "description", text: "In Oracle Java SE und Oracle GraalVM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" über alle Schwachstellen aggregiert und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015904", "T015903", "711976", "T010951", "T015127", "T015126", "T004914", "T015520", "T017494", "T015361", "T024888", "T000872", "5930", "T001663", "398363", "185976", "T015519", "T015518", "T015516", "T019021", "T012167", "T019023", "T019022", "T016243", "T019005", "T019007", "T019006", "2951", "T002207", "T019008", "T000126", "T000066", "1727", ], }, release_date: "2021-04-20T22:00:00.000+00:00", title: "CVE-2021-2163", }, { cve: "CVE-2021-23841", notes: [ { category: "description", text: "In Oracle Java SE und Oracle GraalVM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" über alle Schwachstellen aggregiert und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015904", "T015903", "711976", "T010951", "T015127", "T015126", "T004914", "T015520", "T017494", "T015361", "T024888", "T000872", "5930", "T001663", "398363", "185976", "T015519", "T015518", "T015516", "T019021", "T012167", "T019023", "T019022", "T016243", "T019005", "T019007", "T019006", "2951", "T002207", "T019008", "T000126", "T000066", "1727", ], }, release_date: "2021-04-20T22:00:00.000+00:00", title: "CVE-2021-23841", }, { cve: "CVE-2021-3450", notes: [ { category: "description", text: "In Oracle Java SE und Oracle GraalVM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verfügbarkeit, Vertraulichkeit und Integrität gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Availability\", \"Confidentiality\" und \"Integrity\" über alle Schwachstellen aggregiert und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "T015904", "T015903", "711976", "T010951", "T015127", "T015126", "T004914", "T015520", "T017494", "T015361", "T024888", "T000872", "5930", "T001663", "398363", "185976", "T015519", "T015518", "T015516", "T019021", "T012167", "T019023", "T019022", "T016243", "T019005", "T019007", "T019006", "2951", "T002207", "T019008", "T000126", "T000066", "1727", ], }, release_date: "2021-04-20T22:00:00.000+00:00", title: "CVE-2021-3450", }, ], }
opensuse-su-2021:3615-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-1_8_0-openj9", title: "Title of the patch", }, { category: "description", text: "This update for java-1_8_0-openj9 fixes the following issues:\n\nUpdate to OpenJDK 8u312 build 07 with OpenJ9 0.29.0 virtual machine including\nOracle July 2021 and October 2021 CPU changes\n\n- CVE-2021-2161: Fixed incorrect handling of partially quoted arguments in ProcessBuilder on Windows (bsc#1185056).\n- CVE-2021-2163: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).\n- CVE-2021-2341: Fixed flaw inside the FtpClient (bsc#1188564).\n- CVE-2021-2369: Fixed JAR file handling problem containing multiple MANIFEST.MF files (bsc#1188565).\n- CVE-2021-2388: Fixed flaw inside the Hotspot component performed range check elimination (bsc#1188566).\n- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).\n- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).\n- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).\n- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).\n- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).\n- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).\n- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).\n- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).\n- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).\n- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2021-3615", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3615-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:3615-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:3615-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/", }, { category: "self", summary: "SUSE Bug 1185055", url: "https://bugzilla.suse.com/1185055", }, { category: "self", summary: "SUSE Bug 1185056", url: "https://bugzilla.suse.com/1185056", }, { category: "self", summary: "SUSE Bug 1188564", url: "https://bugzilla.suse.com/1188564", }, { category: "self", summary: "SUSE Bug 1188565", url: "https://bugzilla.suse.com/1188565", }, { category: "self", summary: "SUSE Bug 1188566", url: "https://bugzilla.suse.com/1188566", }, { category: "self", summary: "SUSE Bug 1191901", url: "https://bugzilla.suse.com/1191901", }, { category: "self", summary: "SUSE Bug 1191903", url: "https://bugzilla.suse.com/1191903", }, { category: "self", summary: "SUSE Bug 1191904", url: "https://bugzilla.suse.com/1191904", }, { category: "self", summary: "SUSE Bug 1191906", url: "https://bugzilla.suse.com/1191906", }, { category: "self", summary: "SUSE Bug 1191909", url: "https://bugzilla.suse.com/1191909", }, { category: "self", summary: "SUSE Bug 1191910", url: "https://bugzilla.suse.com/1191910", }, { category: "self", summary: "SUSE Bug 1191911", url: "https://bugzilla.suse.com/1191911", }, { category: "self", summary: "SUSE Bug 1191912", url: "https://bugzilla.suse.com/1191912", }, { category: "self", summary: "SUSE Bug 1191913", url: "https://bugzilla.suse.com/1191913", }, { category: "self", summary: "SUSE Bug 1191914", url: "https://bugzilla.suse.com/1191914", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2163 page", url: "https://www.suse.com/security/cve/CVE-2021-2163/", }, { category: "self", summary: "SUSE CVE CVE-2021-2341 page", url: "https://www.suse.com/security/cve/CVE-2021-2341/", }, { category: "self", summary: "SUSE CVE CVE-2021-2369 page", url: "https://www.suse.com/security/cve/CVE-2021-2369/", }, { category: "self", summary: "SUSE CVE CVE-2021-2388 page", url: "https://www.suse.com/security/cve/CVE-2021-2388/", }, { category: "self", summary: "SUSE CVE CVE-2021-35550 page", url: "https://www.suse.com/security/cve/CVE-2021-35550/", }, { category: "self", summary: "SUSE CVE CVE-2021-35556 page", url: "https://www.suse.com/security/cve/CVE-2021-35556/", }, { category: "self", summary: "SUSE CVE CVE-2021-35559 page", url: "https://www.suse.com/security/cve/CVE-2021-35559/", }, { category: "self", summary: "SUSE CVE CVE-2021-35561 page", url: "https://www.suse.com/security/cve/CVE-2021-35561/", }, { category: "self", summary: "SUSE CVE CVE-2021-35564 page", url: "https://www.suse.com/security/cve/CVE-2021-35564/", }, { category: "self", summary: "SUSE CVE CVE-2021-35565 page", url: "https://www.suse.com/security/cve/CVE-2021-35565/", }, { category: "self", summary: "SUSE CVE CVE-2021-35567 page", url: "https://www.suse.com/security/cve/CVE-2021-35567/", }, { category: "self", summary: "SUSE CVE CVE-2021-35578 page", url: "https://www.suse.com/security/cve/CVE-2021-35578/", }, { category: "self", summary: "SUSE CVE CVE-2021-35586 page", url: "https://www.suse.com/security/cve/CVE-2021-35586/", }, { category: "self", summary: "SUSE CVE CVE-2021-35603 page", url: "https://www.suse.com/security/cve/CVE-2021-35603/", }, ], title: "Security update for java-1_8_0-openj9", tracking: { current_release_date: "2021-11-04T11:27:51Z", generator: { date: "2021-11-04T11:27:51Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:3615-1", initial_release_date: "2021-11-04T11:27:51Z", revision_history: [ { date: "2021-11-04T11:27:51Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", product: { name: "java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", product_id: "java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", product: { name: "java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", product_id: "java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", product: { name: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", product_id: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", product: { name: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", product_id: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", product: { name: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", product_id: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", product: { name: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", product_id: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", product: { name: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", product_id: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", product: { name: "java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", product_id: "java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", product: { name: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", product_id: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", product: { name: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", product_id: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", product: { name: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", product_id: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", product: { name: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", product_id: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", product: { name: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", product_id: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", product: { name: "java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", product_id: "java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", product: { name: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", product_id: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", product: { name: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", product_id: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", product: { name: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", product_id: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", product: { name: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", product_id: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", product: { name: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", product_id: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", }, product_reference: "java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-1.8.0.312-3.18.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", }, product_reference: "java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", }, product_reference: "java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", }, product_reference: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", }, product_reference: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", }, product_reference: "java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", }, product_reference: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", }, product_reference: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", }, product_reference: "java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", }, product_reference: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", }, product_reference: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", }, product_reference: "java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", }, product_reference: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", }, product_reference: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", }, product_reference: "java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", }, product_reference: "java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", }, product_reference: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", }, product_reference: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", }, product_reference: "java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2163", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2163", url: "https://www.suse.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "SUSE Bug 1185055 for CVE-2021-2163", url: "https://bugzilla.suse.com/1185055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "moderate", }, ], title: "CVE-2021-2163", }, { cve: "CVE-2021-2341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2341", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2341", url: "https://www.suse.com/security/cve/CVE-2021-2341", }, { category: "external", summary: "SUSE Bug 1188564 for CVE-2021-2341", url: "https://bugzilla.suse.com/1188564", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "low", }, ], title: "CVE-2021-2341", }, { cve: "CVE-2021-2369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2369", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2369", url: "https://www.suse.com/security/cve/CVE-2021-2369", }, { category: "external", summary: "SUSE Bug 1188565 for CVE-2021-2369", url: "https://bugzilla.suse.com/1188565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "moderate", }, ], title: "CVE-2021-2369", }, { cve: "CVE-2021-2388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2388", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2388", url: "https://www.suse.com/security/cve/CVE-2021-2388", }, { category: "external", summary: "SUSE Bug 1188566 for CVE-2021-2388", url: "https://bugzilla.suse.com/1188566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "important", }, ], title: "CVE-2021-2388", }, { cve: "CVE-2021-35550", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35550", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35550", url: "https://www.suse.com/security/cve/CVE-2021-35550", }, { category: "external", summary: "SUSE Bug 1191901 for CVE-2021-35550", url: "https://bugzilla.suse.com/1191901", }, { category: "external", summary: "SUSE Bug 1193314 for CVE-2021-35550", url: "https://bugzilla.suse.com/1193314", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "moderate", }, ], title: "CVE-2021-35550", }, { cve: "CVE-2021-35556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35556", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35556", url: "https://www.suse.com/security/cve/CVE-2021-35556", }, { category: "external", summary: "SUSE Bug 1191910 for CVE-2021-35556", url: "https://bugzilla.suse.com/1191910", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "moderate", }, ], title: "CVE-2021-35556", }, { cve: "CVE-2021-35559", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35559", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35559", url: "https://www.suse.com/security/cve/CVE-2021-35559", }, { category: "external", summary: "SUSE Bug 1191911 for CVE-2021-35559", url: "https://bugzilla.suse.com/1191911", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "moderate", }, ], title: "CVE-2021-35559", }, { cve: "CVE-2021-35561", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35561", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Utility). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35561", url: "https://www.suse.com/security/cve/CVE-2021-35561", }, { category: "external", summary: "SUSE Bug 1191912 for CVE-2021-35561", url: "https://bugzilla.suse.com/1191912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "moderate", }, ], title: "CVE-2021-35561", }, { cve: "CVE-2021-35564", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35564", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Keytool). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35564", url: "https://www.suse.com/security/cve/CVE-2021-35564", }, { category: "external", summary: "SUSE Bug 1191913 for CVE-2021-35564", url: "https://bugzilla.suse.com/1191913", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "moderate", }, ], title: "CVE-2021-35564", }, { cve: "CVE-2021-35565", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35565", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35565", url: "https://www.suse.com/security/cve/CVE-2021-35565", }, { category: "external", summary: "SUSE Bug 1191909 for CVE-2021-35565", url: "https://bugzilla.suse.com/1191909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "moderate", }, ], title: "CVE-2021-35565", }, { cve: "CVE-2021-35567", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35567", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via Kerberos to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35567", url: "https://www.suse.com/security/cve/CVE-2021-35567", }, { category: "external", summary: "SUSE Bug 1191903 for CVE-2021-35567", url: "https://bugzilla.suse.com/1191903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "moderate", }, ], title: "CVE-2021-35567", }, { cve: "CVE-2021-35578", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35578", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35578", url: "https://www.suse.com/security/cve/CVE-2021-35578", }, { category: "external", summary: "SUSE Bug 1191904 for CVE-2021-35578", url: "https://bugzilla.suse.com/1191904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "moderate", }, ], title: "CVE-2021-35578", }, { cve: "CVE-2021-35586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35586", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35586", url: "https://www.suse.com/security/cve/CVE-2021-35586", }, { category: "external", summary: "SUSE Bug 1191914 for CVE-2021-35586", url: "https://bugzilla.suse.com/1191914", }, { category: "external", summary: "SUSE Bug 1194928 for CVE-2021-35586", url: "https://bugzilla.suse.com/1194928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "moderate", }, ], title: "CVE-2021-35586", }, { cve: "CVE-2021-35603", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35603", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35603", url: "https://www.suse.com/security/cve/CVE-2021-35603", }, { category: "external", summary: "SUSE Bug 1191906 for CVE-2021-35603", url: "https://bugzilla.suse.com/1191906", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.312-3.18.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.312-3.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-04T11:27:51Z", details: "low", }, ], title: "CVE-2021-35603", }, ], }
opensuse-su-2024:10874-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "java-16-openjdk-16.0.2.0-2.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the java-16-openjdk-16.0.2.0-2.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10874", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10874-1.json", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2163 page", url: "https://www.suse.com/security/cve/CVE-2021-2163/", }, { category: "self", summary: "SUSE CVE CVE-2021-2341 page", url: "https://www.suse.com/security/cve/CVE-2021-2341/", }, { category: "self", summary: "SUSE CVE CVE-2021-2369 page", url: "https://www.suse.com/security/cve/CVE-2021-2369/", }, { category: "self", summary: "SUSE CVE CVE-2021-2388 page", url: "https://www.suse.com/security/cve/CVE-2021-2388/", }, ], title: "java-16-openjdk-16.0.2.0-2.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10874-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-16-openjdk-16.0.2.0-2.1.aarch64", product: { name: "java-16-openjdk-16.0.2.0-2.1.aarch64", product_id: "java-16-openjdk-16.0.2.0-2.1.aarch64", }, }, { category: "product_version", name: "java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", product: { name: "java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", product_id: "java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", }, }, { category: "product_version", name: "java-16-openjdk-demo-16.0.2.0-2.1.aarch64", product: { name: "java-16-openjdk-demo-16.0.2.0-2.1.aarch64", product_id: "java-16-openjdk-demo-16.0.2.0-2.1.aarch64", }, }, { category: "product_version", name: "java-16-openjdk-devel-16.0.2.0-2.1.aarch64", product: { name: "java-16-openjdk-devel-16.0.2.0-2.1.aarch64", product_id: "java-16-openjdk-devel-16.0.2.0-2.1.aarch64", }, }, { category: "product_version", name: "java-16-openjdk-headless-16.0.2.0-2.1.aarch64", product: { name: "java-16-openjdk-headless-16.0.2.0-2.1.aarch64", product_id: "java-16-openjdk-headless-16.0.2.0-2.1.aarch64", }, }, { category: "product_version", name: "java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", product: { name: "java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", product_id: "java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", }, }, { category: "product_version", name: "java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", product: { name: "java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", product_id: "java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", }, }, { category: "product_version", name: "java-16-openjdk-src-16.0.2.0-2.1.aarch64", product: { name: "java-16-openjdk-src-16.0.2.0-2.1.aarch64", product_id: "java-16-openjdk-src-16.0.2.0-2.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "java-16-openjdk-16.0.2.0-2.1.ppc64le", product: { name: "java-16-openjdk-16.0.2.0-2.1.ppc64le", product_id: "java-16-openjdk-16.0.2.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", product: { name: "java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", product_id: "java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", product: { name: "java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", product_id: "java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", product: { name: "java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", product_id: "java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", product: { name: "java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", product_id: "java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", product: { name: "java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", product_id: "java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", product: { name: "java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", product_id: "java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-16-openjdk-src-16.0.2.0-2.1.ppc64le", product: { name: "java-16-openjdk-src-16.0.2.0-2.1.ppc64le", product_id: "java-16-openjdk-src-16.0.2.0-2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-16-openjdk-16.0.2.0-2.1.s390x", product: { name: "java-16-openjdk-16.0.2.0-2.1.s390x", product_id: "java-16-openjdk-16.0.2.0-2.1.s390x", }, }, { category: "product_version", name: "java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", product: { name: "java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", product_id: "java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", }, }, { category: "product_version", name: "java-16-openjdk-demo-16.0.2.0-2.1.s390x", product: { name: "java-16-openjdk-demo-16.0.2.0-2.1.s390x", product_id: "java-16-openjdk-demo-16.0.2.0-2.1.s390x", }, }, { category: "product_version", name: "java-16-openjdk-devel-16.0.2.0-2.1.s390x", product: { name: "java-16-openjdk-devel-16.0.2.0-2.1.s390x", product_id: "java-16-openjdk-devel-16.0.2.0-2.1.s390x", }, }, { category: "product_version", name: "java-16-openjdk-headless-16.0.2.0-2.1.s390x", product: { name: "java-16-openjdk-headless-16.0.2.0-2.1.s390x", product_id: "java-16-openjdk-headless-16.0.2.0-2.1.s390x", }, }, { category: "product_version", name: "java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", product: { name: "java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", product_id: "java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", }, }, { category: "product_version", name: "java-16-openjdk-jmods-16.0.2.0-2.1.s390x", product: { name: "java-16-openjdk-jmods-16.0.2.0-2.1.s390x", product_id: "java-16-openjdk-jmods-16.0.2.0-2.1.s390x", }, }, { category: "product_version", name: "java-16-openjdk-src-16.0.2.0-2.1.s390x", product: { name: "java-16-openjdk-src-16.0.2.0-2.1.s390x", product_id: "java-16-openjdk-src-16.0.2.0-2.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-16-openjdk-16.0.2.0-2.1.x86_64", product: { name: "java-16-openjdk-16.0.2.0-2.1.x86_64", product_id: "java-16-openjdk-16.0.2.0-2.1.x86_64", }, }, { category: "product_version", name: "java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", product: { name: "java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", product_id: "java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", }, }, { category: "product_version", name: "java-16-openjdk-demo-16.0.2.0-2.1.x86_64", product: { name: "java-16-openjdk-demo-16.0.2.0-2.1.x86_64", product_id: "java-16-openjdk-demo-16.0.2.0-2.1.x86_64", }, }, { category: "product_version", name: "java-16-openjdk-devel-16.0.2.0-2.1.x86_64", product: { name: "java-16-openjdk-devel-16.0.2.0-2.1.x86_64", product_id: "java-16-openjdk-devel-16.0.2.0-2.1.x86_64", }, }, { category: "product_version", name: "java-16-openjdk-headless-16.0.2.0-2.1.x86_64", product: { name: "java-16-openjdk-headless-16.0.2.0-2.1.x86_64", product_id: "java-16-openjdk-headless-16.0.2.0-2.1.x86_64", }, }, { category: "product_version", name: "java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", product: { name: "java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", product_id: "java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", }, }, { category: "product_version", name: "java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", product: { name: "java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", product_id: "java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", }, }, { category: "product_version", name: "java-16-openjdk-src-16.0.2.0-2.1.x86_64", product: { name: "java-16-openjdk-src-16.0.2.0-2.1.x86_64", product_id: "java-16-openjdk-src-16.0.2.0-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-16-openjdk-16.0.2.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", }, product_reference: "java-16-openjdk-16.0.2.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-16.0.2.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", }, product_reference: "java-16-openjdk-16.0.2.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-16.0.2.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", }, product_reference: "java-16-openjdk-16.0.2.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-16.0.2.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", }, product_reference: "java-16-openjdk-16.0.2.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", }, product_reference: "java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", }, product_reference: "java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-accessibility-16.0.2.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", }, product_reference: "java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", }, product_reference: "java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-demo-16.0.2.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", }, product_reference: "java-16-openjdk-demo-16.0.2.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-demo-16.0.2.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", }, product_reference: "java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-demo-16.0.2.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", }, product_reference: "java-16-openjdk-demo-16.0.2.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-demo-16.0.2.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", }, product_reference: "java-16-openjdk-demo-16.0.2.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-devel-16.0.2.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", }, product_reference: "java-16-openjdk-devel-16.0.2.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-devel-16.0.2.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", }, product_reference: "java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-devel-16.0.2.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", }, product_reference: "java-16-openjdk-devel-16.0.2.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-devel-16.0.2.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", }, product_reference: "java-16-openjdk-devel-16.0.2.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-headless-16.0.2.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", }, product_reference: "java-16-openjdk-headless-16.0.2.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-headless-16.0.2.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", }, product_reference: "java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-headless-16.0.2.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", }, product_reference: "java-16-openjdk-headless-16.0.2.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-headless-16.0.2.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", }, product_reference: "java-16-openjdk-headless-16.0.2.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", }, product_reference: "java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", }, product_reference: "java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-javadoc-16.0.2.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", }, product_reference: "java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", }, product_reference: "java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-jmods-16.0.2.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", }, product_reference: "java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", }, product_reference: "java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-jmods-16.0.2.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", }, product_reference: "java-16-openjdk-jmods-16.0.2.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-jmods-16.0.2.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", }, product_reference: "java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-src-16.0.2.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", }, product_reference: "java-16-openjdk-src-16.0.2.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-src-16.0.2.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", }, product_reference: "java-16-openjdk-src-16.0.2.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-src-16.0.2.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", }, product_reference: "java-16-openjdk-src-16.0.2.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-16-openjdk-src-16.0.2.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", }, product_reference: "java-16-openjdk-src-16.0.2.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2163", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2163", url: "https://www.suse.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "SUSE Bug 1185055 for CVE-2021-2163", url: "https://bugzilla.suse.com/1185055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2163", }, { cve: "CVE-2021-2341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2341", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2341", url: "https://www.suse.com/security/cve/CVE-2021-2341", }, { category: "external", summary: "SUSE Bug 1188564 for CVE-2021-2341", url: "https://bugzilla.suse.com/1188564", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-2341", }, { cve: "CVE-2021-2369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2369", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2369", url: "https://www.suse.com/security/cve/CVE-2021-2369", }, { category: "external", summary: "SUSE Bug 1188565 for CVE-2021-2369", url: "https://bugzilla.suse.com/1188565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2369", }, { cve: "CVE-2021-2388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2388", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2388", url: "https://www.suse.com/security/cve/CVE-2021-2388", }, { category: "external", summary: "SUSE Bug 1188566 for CVE-2021-2388", url: "https://bugzilla.suse.com/1188566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-accessibility-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-demo-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-devel-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-headless-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-javadoc-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-jmods-16.0.2.0-2.1.x86_64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.aarch64", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.ppc64le", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.s390x", "openSUSE Tumbleweed:java-16-openjdk-src-16.0.2.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-2388", }, ], }
opensuse-su-2024:10872-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "java-13-openjdk-13.0.8.0-3.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the java-13-openjdk-13.0.8.0-3.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10872", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10872-1.json", }, { category: "self", summary: "SUSE CVE CVE-2018-11212 page", url: "https://www.suse.com/security/cve/CVE-2018-11212/", }, { category: "self", summary: "SUSE CVE CVE-2018-2790 page", url: "https://www.suse.com/security/cve/CVE-2018-2790/", }, { category: "self", summary: "SUSE CVE CVE-2018-2794 page", url: "https://www.suse.com/security/cve/CVE-2018-2794/", }, { category: "self", summary: "SUSE CVE CVE-2018-2795 page", url: "https://www.suse.com/security/cve/CVE-2018-2795/", }, { category: "self", summary: "SUSE CVE CVE-2018-2796 page", url: "https://www.suse.com/security/cve/CVE-2018-2796/", }, { category: "self", summary: "SUSE CVE CVE-2018-2797 page", url: "https://www.suse.com/security/cve/CVE-2018-2797/", }, { category: "self", summary: "SUSE CVE CVE-2018-2798 page", url: "https://www.suse.com/security/cve/CVE-2018-2798/", }, { category: "self", summary: "SUSE CVE CVE-2018-2799 page", url: "https://www.suse.com/security/cve/CVE-2018-2799/", }, { category: "self", summary: "SUSE CVE CVE-2018-2814 page", url: "https://www.suse.com/security/cve/CVE-2018-2814/", }, { category: "self", summary: "SUSE CVE CVE-2018-2825 page", url: "https://www.suse.com/security/cve/CVE-2018-2825/", }, { category: "self", summary: "SUSE CVE CVE-2018-2826 page", url: "https://www.suse.com/security/cve/CVE-2018-2826/", }, { category: "self", summary: "SUSE CVE CVE-2018-2940 page", url: "https://www.suse.com/security/cve/CVE-2018-2940/", }, { category: "self", summary: "SUSE CVE CVE-2018-2952 page", url: "https://www.suse.com/security/cve/CVE-2018-2952/", }, { category: "self", summary: "SUSE CVE CVE-2018-2972 page", url: "https://www.suse.com/security/cve/CVE-2018-2972/", }, { category: "self", summary: "SUSE CVE CVE-2018-2973 page", url: "https://www.suse.com/security/cve/CVE-2018-2973/", }, { category: "self", summary: "SUSE CVE CVE-2018-3136 page", url: "https://www.suse.com/security/cve/CVE-2018-3136/", }, { category: "self", summary: "SUSE CVE CVE-2018-3139 page", url: "https://www.suse.com/security/cve/CVE-2018-3139/", }, { category: "self", summary: "SUSE CVE CVE-2018-3149 page", url: "https://www.suse.com/security/cve/CVE-2018-3149/", }, { category: "self", summary: "SUSE CVE CVE-2018-3150 page", url: "https://www.suse.com/security/cve/CVE-2018-3150/", }, { category: "self", summary: "SUSE CVE CVE-2018-3157 page", url: "https://www.suse.com/security/cve/CVE-2018-3157/", }, { category: "self", summary: "SUSE CVE CVE-2018-3169 page", url: "https://www.suse.com/security/cve/CVE-2018-3169/", }, { category: "self", summary: "SUSE CVE CVE-2018-3180 page", url: "https://www.suse.com/security/cve/CVE-2018-3180/", }, { category: "self", summary: "SUSE CVE CVE-2018-3183 page", url: "https://www.suse.com/security/cve/CVE-2018-3183/", }, { category: "self", summary: "SUSE CVE CVE-2019-2422 page", url: "https://www.suse.com/security/cve/CVE-2019-2422/", }, { category: "self", summary: "SUSE CVE CVE-2019-2426 page", url: "https://www.suse.com/security/cve/CVE-2019-2426/", }, { category: "self", summary: "SUSE CVE CVE-2019-2602 page", url: "https://www.suse.com/security/cve/CVE-2019-2602/", }, { category: "self", summary: "SUSE CVE CVE-2019-2684 page", url: "https://www.suse.com/security/cve/CVE-2019-2684/", }, { category: "self", summary: "SUSE CVE CVE-2019-2745 page", url: "https://www.suse.com/security/cve/CVE-2019-2745/", }, { category: "self", summary: "SUSE CVE CVE-2019-2762 page", url: "https://www.suse.com/security/cve/CVE-2019-2762/", }, { category: "self", summary: "SUSE CVE CVE-2019-2766 page", url: "https://www.suse.com/security/cve/CVE-2019-2766/", }, { category: "self", summary: "SUSE CVE CVE-2019-2769 page", url: "https://www.suse.com/security/cve/CVE-2019-2769/", }, { category: "self", summary: "SUSE CVE CVE-2019-2786 page", url: "https://www.suse.com/security/cve/CVE-2019-2786/", }, { category: "self", summary: "SUSE CVE CVE-2019-2816 page", url: "https://www.suse.com/security/cve/CVE-2019-2816/", }, { category: "self", summary: "SUSE CVE CVE-2019-2818 page", url: "https://www.suse.com/security/cve/CVE-2019-2818/", }, { category: "self", summary: "SUSE CVE CVE-2019-2821 page", url: "https://www.suse.com/security/cve/CVE-2019-2821/", }, { category: "self", summary: "SUSE CVE CVE-2019-2894 page", url: "https://www.suse.com/security/cve/CVE-2019-2894/", }, { category: "self", summary: "SUSE CVE CVE-2019-2933 page", url: "https://www.suse.com/security/cve/CVE-2019-2933/", }, { category: "self", summary: "SUSE CVE CVE-2019-2945 page", url: "https://www.suse.com/security/cve/CVE-2019-2945/", }, { category: "self", summary: "SUSE CVE CVE-2019-2949 page", url: "https://www.suse.com/security/cve/CVE-2019-2949/", }, { category: "self", summary: "SUSE CVE CVE-2019-2958 page", url: "https://www.suse.com/security/cve/CVE-2019-2958/", }, { category: "self", summary: "SUSE CVE CVE-2019-2962 page", url: "https://www.suse.com/security/cve/CVE-2019-2962/", }, { category: "self", summary: "SUSE CVE CVE-2019-2964 page", url: "https://www.suse.com/security/cve/CVE-2019-2964/", }, { category: "self", summary: "SUSE CVE CVE-2019-2973 page", url: "https://www.suse.com/security/cve/CVE-2019-2973/", }, { category: "self", summary: "SUSE CVE CVE-2019-2975 page", url: "https://www.suse.com/security/cve/CVE-2019-2975/", }, { category: "self", summary: "SUSE CVE CVE-2019-2977 page", url: "https://www.suse.com/security/cve/CVE-2019-2977/", }, { category: "self", summary: "SUSE CVE CVE-2019-2978 page", url: "https://www.suse.com/security/cve/CVE-2019-2978/", }, { category: "self", summary: "SUSE CVE CVE-2019-2981 page", url: "https://www.suse.com/security/cve/CVE-2019-2981/", }, { category: "self", summary: "SUSE CVE CVE-2019-2983 page", url: "https://www.suse.com/security/cve/CVE-2019-2983/", }, { category: "self", summary: "SUSE CVE CVE-2019-2987 page", url: "https://www.suse.com/security/cve/CVE-2019-2987/", }, { category: "self", summary: "SUSE CVE CVE-2019-2988 page", url: "https://www.suse.com/security/cve/CVE-2019-2988/", }, { category: "self", summary: "SUSE CVE CVE-2019-2989 page", url: "https://www.suse.com/security/cve/CVE-2019-2989/", }, { category: "self", summary: "SUSE CVE CVE-2019-2992 page", url: "https://www.suse.com/security/cve/CVE-2019-2992/", }, { category: "self", summary: "SUSE CVE CVE-2019-2999 page", url: "https://www.suse.com/security/cve/CVE-2019-2999/", }, { category: "self", summary: "SUSE CVE CVE-2019-7317 page", url: "https://www.suse.com/security/cve/CVE-2019-7317/", }, { category: "self", summary: "SUSE CVE CVE-2020-14556 page", url: "https://www.suse.com/security/cve/CVE-2020-14556/", }, { category: "self", summary: "SUSE CVE CVE-2020-14562 page", url: "https://www.suse.com/security/cve/CVE-2020-14562/", }, { category: "self", summary: "SUSE CVE CVE-2020-14573 page", url: "https://www.suse.com/security/cve/CVE-2020-14573/", }, { category: "self", summary: "SUSE CVE CVE-2020-14577 page", url: "https://www.suse.com/security/cve/CVE-2020-14577/", }, { category: "self", summary: "SUSE CVE CVE-2020-14581 page", url: "https://www.suse.com/security/cve/CVE-2020-14581/", }, { category: "self", summary: "SUSE CVE CVE-2020-14583 page", url: "https://www.suse.com/security/cve/CVE-2020-14583/", }, { category: "self", summary: "SUSE CVE CVE-2020-14593 page", url: "https://www.suse.com/security/cve/CVE-2020-14593/", }, { category: "self", summary: "SUSE CVE CVE-2020-14621 page", url: "https://www.suse.com/security/cve/CVE-2020-14621/", }, { category: "self", summary: "SUSE CVE CVE-2020-14779 page", url: "https://www.suse.com/security/cve/CVE-2020-14779/", }, { category: "self", summary: "SUSE CVE CVE-2020-14781 page", url: "https://www.suse.com/security/cve/CVE-2020-14781/", }, { category: "self", summary: "SUSE CVE CVE-2020-14782 page", url: "https://www.suse.com/security/cve/CVE-2020-14782/", }, { category: "self", summary: "SUSE CVE CVE-2020-14792 page", url: "https://www.suse.com/security/cve/CVE-2020-14792/", }, { category: "self", summary: "SUSE CVE CVE-2020-14796 page", url: "https://www.suse.com/security/cve/CVE-2020-14796/", }, { category: "self", summary: "SUSE CVE CVE-2020-14797 page", url: "https://www.suse.com/security/cve/CVE-2020-14797/", }, { category: "self", summary: "SUSE CVE CVE-2020-14798 page", url: "https://www.suse.com/security/cve/CVE-2020-14798/", }, { category: "self", summary: "SUSE CVE CVE-2020-14803 page", url: "https://www.suse.com/security/cve/CVE-2020-14803/", }, { category: "self", summary: "SUSE CVE CVE-2020-2583 page", url: "https://www.suse.com/security/cve/CVE-2020-2583/", }, { category: "self", summary: "SUSE CVE CVE-2020-2590 page", url: "https://www.suse.com/security/cve/CVE-2020-2590/", }, { category: "self", summary: "SUSE CVE CVE-2020-2593 page", url: "https://www.suse.com/security/cve/CVE-2020-2593/", }, { category: "self", summary: "SUSE CVE CVE-2020-2601 page", url: "https://www.suse.com/security/cve/CVE-2020-2601/", }, { category: "self", summary: "SUSE CVE CVE-2020-2604 page", url: "https://www.suse.com/security/cve/CVE-2020-2604/", }, { category: "self", summary: "SUSE CVE CVE-2020-2654 page", url: "https://www.suse.com/security/cve/CVE-2020-2654/", }, { category: "self", summary: "SUSE CVE CVE-2020-2655 page", url: "https://www.suse.com/security/cve/CVE-2020-2655/", }, { category: "self", summary: "SUSE CVE CVE-2020-2754 page", url: "https://www.suse.com/security/cve/CVE-2020-2754/", }, { category: "self", summary: "SUSE CVE CVE-2020-2755 page", url: "https://www.suse.com/security/cve/CVE-2020-2755/", }, { category: "self", summary: "SUSE CVE CVE-2020-2756 page", url: "https://www.suse.com/security/cve/CVE-2020-2756/", }, { category: "self", summary: "SUSE CVE CVE-2020-2757 page", url: "https://www.suse.com/security/cve/CVE-2020-2757/", }, { category: "self", summary: "SUSE CVE CVE-2020-2767 page", url: "https://www.suse.com/security/cve/CVE-2020-2767/", }, { category: "self", summary: "SUSE CVE CVE-2020-2773 page", url: "https://www.suse.com/security/cve/CVE-2020-2773/", }, { category: "self", summary: "SUSE CVE CVE-2020-2778 page", url: "https://www.suse.com/security/cve/CVE-2020-2778/", }, { category: "self", summary: "SUSE CVE CVE-2020-2781 page", url: "https://www.suse.com/security/cve/CVE-2020-2781/", }, { category: "self", summary: "SUSE CVE CVE-2020-2800 page", url: "https://www.suse.com/security/cve/CVE-2020-2800/", }, { category: "self", summary: "SUSE CVE CVE-2020-2803 page", url: "https://www.suse.com/security/cve/CVE-2020-2803/", }, { category: "self", summary: "SUSE CVE CVE-2020-2805 page", url: "https://www.suse.com/security/cve/CVE-2020-2805/", }, { category: "self", summary: "SUSE CVE CVE-2020-2816 page", url: "https://www.suse.com/security/cve/CVE-2020-2816/", }, { category: "self", summary: "SUSE CVE CVE-2020-2830 page", url: "https://www.suse.com/security/cve/CVE-2020-2830/", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2163 page", url: "https://www.suse.com/security/cve/CVE-2021-2163/", }, { category: "self", summary: "SUSE CVE CVE-2021-2341 page", url: "https://www.suse.com/security/cve/CVE-2021-2341/", }, { category: "self", summary: "SUSE CVE CVE-2021-2369 page", url: "https://www.suse.com/security/cve/CVE-2021-2369/", }, { category: "self", summary: "SUSE CVE CVE-2021-2388 page", url: "https://www.suse.com/security/cve/CVE-2021-2388/", }, ], title: "java-13-openjdk-13.0.8.0-3.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10872-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-13-openjdk-13.0.8.0-3.1.aarch64", product: { name: "java-13-openjdk-13.0.8.0-3.1.aarch64", product_id: "java-13-openjdk-13.0.8.0-3.1.aarch64", }, }, { category: "product_version", name: "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", product: { name: "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", product_id: "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", }, }, { category: "product_version", name: "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", product: { name: "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", product_id: "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", }, }, { category: "product_version", name: "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", product: { name: "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", product_id: "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", }, }, { category: "product_version", name: "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", product: { name: "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", product_id: "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", }, }, { category: "product_version", name: "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", product: { name: "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", product_id: "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", }, }, { category: "product_version", name: "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", product: { name: "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", product_id: "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", }, }, { category: "product_version", name: "java-13-openjdk-src-13.0.8.0-3.1.aarch64", product: { name: "java-13-openjdk-src-13.0.8.0-3.1.aarch64", product_id: "java-13-openjdk-src-13.0.8.0-3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "java-13-openjdk-13.0.8.0-3.1.ppc64le", product: { name: "java-13-openjdk-13.0.8.0-3.1.ppc64le", product_id: "java-13-openjdk-13.0.8.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", product: { name: "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", product_id: "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", product: { name: "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", product_id: "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", product: { name: "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", product_id: "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", product: { name: "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", product_id: "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", product: { name: "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", product_id: "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", product: { name: "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", product_id: "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", product: { name: "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", product_id: "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-13-openjdk-13.0.8.0-3.1.s390x", product: { name: "java-13-openjdk-13.0.8.0-3.1.s390x", product_id: "java-13-openjdk-13.0.8.0-3.1.s390x", }, }, { category: "product_version", name: "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", product: { name: "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", product_id: "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", }, }, { category: "product_version", name: "java-13-openjdk-demo-13.0.8.0-3.1.s390x", product: { name: "java-13-openjdk-demo-13.0.8.0-3.1.s390x", product_id: "java-13-openjdk-demo-13.0.8.0-3.1.s390x", }, }, { category: "product_version", name: "java-13-openjdk-devel-13.0.8.0-3.1.s390x", product: { name: "java-13-openjdk-devel-13.0.8.0-3.1.s390x", product_id: "java-13-openjdk-devel-13.0.8.0-3.1.s390x", }, }, { category: "product_version", name: "java-13-openjdk-headless-13.0.8.0-3.1.s390x", product: { name: "java-13-openjdk-headless-13.0.8.0-3.1.s390x", product_id: "java-13-openjdk-headless-13.0.8.0-3.1.s390x", }, }, { category: "product_version", name: "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", product: { name: "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", product_id: "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", }, }, { category: "product_version", name: "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", product: { name: "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", product_id: "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", }, }, { category: "product_version", name: "java-13-openjdk-src-13.0.8.0-3.1.s390x", product: { name: "java-13-openjdk-src-13.0.8.0-3.1.s390x", product_id: "java-13-openjdk-src-13.0.8.0-3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-13-openjdk-13.0.8.0-3.1.x86_64", product: { name: "java-13-openjdk-13.0.8.0-3.1.x86_64", product_id: "java-13-openjdk-13.0.8.0-3.1.x86_64", }, }, { category: "product_version", name: "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", product: { name: "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", product_id: "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", }, }, { category: "product_version", name: "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", product: { name: "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", product_id: "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", }, }, { category: "product_version", name: "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", product: { name: "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", product_id: "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", }, }, { category: "product_version", name: "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", product: { name: "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", product_id: "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", }, }, { category: "product_version", name: "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", product: { name: "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", product_id: "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", }, }, { category: "product_version", name: "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", product: { name: "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", product_id: "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", }, }, { category: "product_version", name: "java-13-openjdk-src-13.0.8.0-3.1.x86_64", product: { name: "java-13-openjdk-src-13.0.8.0-3.1.x86_64", product_id: "java-13-openjdk-src-13.0.8.0-3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-13-openjdk-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", }, product_reference: "java-13-openjdk-13.0.8.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", }, product_reference: "java-13-openjdk-13.0.8.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", }, product_reference: "java-13-openjdk-13.0.8.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", }, product_reference: "java-13-openjdk-13.0.8.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", }, product_reference: "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", }, product_reference: "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", }, product_reference: "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", }, product_reference: "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-demo-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", }, product_reference: "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", }, product_reference: "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-demo-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", }, product_reference: "java-13-openjdk-demo-13.0.8.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-demo-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", }, product_reference: "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-devel-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", }, product_reference: "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", }, product_reference: "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-devel-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", }, product_reference: "java-13-openjdk-devel-13.0.8.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-devel-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", }, product_reference: "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-headless-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", }, product_reference: "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", }, product_reference: "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-headless-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", }, product_reference: "java-13-openjdk-headless-13.0.8.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-headless-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", }, product_reference: "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", }, product_reference: "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", }, product_reference: "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", }, product_reference: "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", }, product_reference: "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", }, product_reference: "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", }, product_reference: "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-jmods-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", }, product_reference: "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", }, product_reference: "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-src-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", }, product_reference: "java-13-openjdk-src-13.0.8.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-src-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", }, product_reference: "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-src-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", }, product_reference: "java-13-openjdk-src-13.0.8.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-13-openjdk-src-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", }, product_reference: "java-13-openjdk-src-13.0.8.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2018-11212", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-11212", }, ], notes: [ { category: "general", text: "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-11212", url: "https://www.suse.com/security/cve/CVE-2018-11212", }, { category: "external", summary: "SUSE Bug 1122299 for CVE-2018-11212", url: "https://bugzilla.suse.com/1122299", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-11212", }, { cve: "CVE-2018-2790", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2790", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2790", url: "https://www.suse.com/security/cve/CVE-2018-2790", }, { category: "external", summary: "SUSE Bug 1090023 for CVE-2018-2790", url: "https://bugzilla.suse.com/1090023", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2790", url: "https://bugzilla.suse.com/1093311", }, { category: "external", summary: "SUSE Bug 1101637 for CVE-2018-2790", url: "https://bugzilla.suse.com/1101637", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-2790", }, { cve: "CVE-2018-2794", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2794", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2794", url: "https://www.suse.com/security/cve/CVE-2018-2794", }, { category: "external", summary: "SUSE Bug 1090024 for CVE-2018-2794", url: "https://bugzilla.suse.com/1090024", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2794", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2794", }, { cve: "CVE-2018-2795", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2795", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2795", url: "https://www.suse.com/security/cve/CVE-2018-2795", }, { category: "external", summary: "SUSE Bug 1090025 for CVE-2018-2795", url: "https://bugzilla.suse.com/1090025", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2795", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2795", }, { cve: "CVE-2018-2796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2796", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2796", url: "https://www.suse.com/security/cve/CVE-2018-2796", }, { category: "external", summary: "SUSE Bug 1090026 for CVE-2018-2796", url: "https://bugzilla.suse.com/1090026", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2796", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2796", }, { cve: "CVE-2018-2797", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2797", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2797", url: "https://www.suse.com/security/cve/CVE-2018-2797", }, { category: "external", summary: "SUSE Bug 1090027 for CVE-2018-2797", url: "https://bugzilla.suse.com/1090027", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2797", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2797", }, { cve: "CVE-2018-2798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2798", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2798", url: "https://www.suse.com/security/cve/CVE-2018-2798", }, { category: "external", summary: "SUSE Bug 1090028 for CVE-2018-2798", url: "https://bugzilla.suse.com/1090028", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2798", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2798", }, { cve: "CVE-2018-2799", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2799", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2799", url: "https://www.suse.com/security/cve/CVE-2018-2799", }, { category: "external", summary: "SUSE Bug 1090029 for CVE-2018-2799", url: "https://bugzilla.suse.com/1090029", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2799", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2799", }, { cve: "CVE-2018-2814", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2814", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2814", url: "https://www.suse.com/security/cve/CVE-2018-2814", }, { category: "external", summary: "SUSE Bug 1090032 for CVE-2018-2814", url: "https://bugzilla.suse.com/1090032", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2814", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2814", }, { cve: "CVE-2018-2825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2825", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2825", url: "https://www.suse.com/security/cve/CVE-2018-2825", }, { category: "external", summary: "SUSE Bug 1090196 for CVE-2018-2825", url: "https://bugzilla.suse.com/1090196", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2825", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2825", }, { cve: "CVE-2018-2826", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2826", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2826", url: "https://www.suse.com/security/cve/CVE-2018-2826", }, { category: "external", summary: "SUSE Bug 1090197 for CVE-2018-2826", url: "https://bugzilla.suse.com/1090197", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2826", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2826", }, { cve: "CVE-2018-2940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2940", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2940", url: "https://www.suse.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2940", }, { cve: "CVE-2018-2952", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2952", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2952", url: "https://www.suse.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101651 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101651", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2952", }, { cve: "CVE-2018-2972", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2972", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2972", url: "https://www.suse.com/security/cve/CVE-2018-2972", }, { category: "external", summary: "SUSE Bug 1101655 for CVE-2018-2972", url: "https://bugzilla.suse.com/1101655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2972", }, { cve: "CVE-2018-2973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2973", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2973", url: "https://www.suse.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2973", }, { cve: "CVE-2018-3136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3136", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3136", url: "https://www.suse.com/security/cve/CVE-2018-3136", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3136", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3136", }, { cve: "CVE-2018-3139", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3139", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3139", url: "https://www.suse.com/security/cve/CVE-2018-3139", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3139", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3139", }, { cve: "CVE-2018-3149", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3149", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3149", url: "https://www.suse.com/security/cve/CVE-2018-3149", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3149", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-3149", }, { cve: "CVE-2018-3150", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3150", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3150", url: "https://www.suse.com/security/cve/CVE-2018-3150", }, { category: "external", summary: "SUSE Bug 1112145 for CVE-2018-3150", url: "https://bugzilla.suse.com/1112145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3150", }, { cve: "CVE-2018-3157", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3157", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Sound). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3157", url: "https://www.suse.com/security/cve/CVE-2018-3157", }, { category: "external", summary: "SUSE Bug 1112149 for CVE-2018-3157", url: "https://bugzilla.suse.com/1112149", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3157", }, { cve: "CVE-2018-3169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3169", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3169", url: "https://www.suse.com/security/cve/CVE-2018-3169", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3169", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-3169", }, { cve: "CVE-2018-3180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3180", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3180", url: "https://www.suse.com/security/cve/CVE-2018-3180", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112147 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112147", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3180", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-3180", }, { cve: "CVE-2018-3183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3183", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3183", url: "https://www.suse.com/security/cve/CVE-2018-3183", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3183", url: "https://bugzilla.suse.com/1116574", }, { category: "external", summary: "SUSE Bug 1120714 for CVE-2018-3183", url: "https://bugzilla.suse.com/1120714", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-3183", }, { cve: "CVE-2019-2422", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2422", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2422", url: "https://www.suse.com/security/cve/CVE-2019-2422", }, { category: "external", summary: "SUSE Bug 1122293 for CVE-2019-2422", url: "https://bugzilla.suse.com/1122293", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2422", }, { cve: "CVE-2019-2426", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2426", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2426", url: "https://www.suse.com/security/cve/CVE-2019-2426", }, { category: "external", summary: "SUSE Bug 1134297 for CVE-2019-2426", url: "https://bugzilla.suse.com/1134297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2426", }, { cve: "CVE-2019-2602", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2602", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2602", url: "https://www.suse.com/security/cve/CVE-2019-2602", }, { category: "external", summary: "SUSE Bug 1132728 for CVE-2019-2602", url: "https://bugzilla.suse.com/1132728", }, { category: "external", summary: "SUSE Bug 1134718 for CVE-2019-2602", url: "https://bugzilla.suse.com/1134718", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2602", }, { cve: "CVE-2019-2684", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2684", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2684", url: "https://www.suse.com/security/cve/CVE-2019-2684", }, { category: "external", summary: "SUSE Bug 1132732 for CVE-2019-2684", url: "https://bugzilla.suse.com/1132732", }, { category: "external", summary: "SUSE Bug 1134718 for CVE-2019-2684", url: "https://bugzilla.suse.com/1134718", }, { category: "external", summary: "SUSE Bug 1184734 for CVE-2019-2684", url: "https://bugzilla.suse.com/1184734", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2684", }, { cve: "CVE-2019-2745", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2745", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2745", url: "https://www.suse.com/security/cve/CVE-2019-2745", }, { category: "external", summary: "SUSE Bug 1141784 for CVE-2019-2745", url: "https://bugzilla.suse.com/1141784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2745", }, { cve: "CVE-2019-2762", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2762", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2762", url: "https://www.suse.com/security/cve/CVE-2019-2762", }, { category: "external", summary: "SUSE Bug 1141782 for CVE-2019-2762", url: "https://bugzilla.suse.com/1141782", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2762", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2762", }, { cve: "CVE-2019-2766", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2766", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2766", url: "https://www.suse.com/security/cve/CVE-2019-2766", }, { category: "external", summary: "SUSE Bug 1141789 for CVE-2019-2766", url: "https://bugzilla.suse.com/1141789", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2766", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2766", }, { cve: "CVE-2019-2769", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2769", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2769", url: "https://www.suse.com/security/cve/CVE-2019-2769", }, { category: "external", summary: "SUSE Bug 1141783 for CVE-2019-2769", url: "https://bugzilla.suse.com/1141783", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2769", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2769", }, { cve: "CVE-2019-2786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2786", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2786", url: "https://www.suse.com/security/cve/CVE-2019-2786", }, { category: "external", summary: "SUSE Bug 1141787 for CVE-2019-2786", url: "https://bugzilla.suse.com/1141787", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2786", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2786", }, { cve: "CVE-2019-2816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2816", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2816", url: "https://www.suse.com/security/cve/CVE-2019-2816", }, { category: "external", summary: "SUSE Bug 1141785 for CVE-2019-2816", url: "https://bugzilla.suse.com/1141785", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2816", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2816", }, { cve: "CVE-2019-2818", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2818", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2818", url: "https://www.suse.com/security/cve/CVE-2019-2818", }, { category: "external", summary: "SUSE Bug 1141788 for CVE-2019-2818", url: "https://bugzilla.suse.com/1141788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2818", }, { cve: "CVE-2019-2821", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2821", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2821", url: "https://www.suse.com/security/cve/CVE-2019-2821", }, { category: "external", summary: "SUSE Bug 1141781 for CVE-2019-2821", url: "https://bugzilla.suse.com/1141781", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2821", }, { cve: "CVE-2019-2894", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2894", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2894", url: "https://www.suse.com/security/cve/CVE-2019-2894", }, { category: "external", summary: "SUSE Bug 1152856 for CVE-2019-2894", url: "https://bugzilla.suse.com/1152856", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2894", url: "https://bugzilla.suse.com/1154212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2894", }, { cve: "CVE-2019-2933", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2933", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2933", url: "https://www.suse.com/security/cve/CVE-2019-2933", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2933", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2933", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2933", }, { cve: "CVE-2019-2945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2945", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2945", url: "https://www.suse.com/security/cve/CVE-2019-2945", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2945", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2945", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2945", }, { cve: "CVE-2019-2949", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2949", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2949", url: "https://www.suse.com/security/cve/CVE-2019-2949", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2949", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2019-2949", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2949", }, { cve: "CVE-2019-2958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2958", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2958", url: "https://www.suse.com/security/cve/CVE-2019-2958", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2958", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2958", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2958", }, { cve: "CVE-2019-2962", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2962", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2962", url: "https://www.suse.com/security/cve/CVE-2019-2962", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2962", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2962", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2962", }, { cve: "CVE-2019-2964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2964", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2964", url: "https://www.suse.com/security/cve/CVE-2019-2964", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2964", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2964", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2964", }, { cve: "CVE-2019-2973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2973", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2973", url: "https://www.suse.com/security/cve/CVE-2019-2973", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2973", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2973", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2973", }, { cve: "CVE-2019-2975", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2975", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2975", url: "https://www.suse.com/security/cve/CVE-2019-2975", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2975", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2975", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2975", }, { cve: "CVE-2019-2977", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2977", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.8 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2977", url: "https://www.suse.com/security/cve/CVE-2019-2977", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2977", url: "https://bugzilla.suse.com/1154212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2977", }, { cve: "CVE-2019-2978", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2978", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2978", url: "https://www.suse.com/security/cve/CVE-2019-2978", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2978", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2978", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2978", }, { cve: "CVE-2019-2981", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2981", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2981", url: "https://www.suse.com/security/cve/CVE-2019-2981", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2981", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2981", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2981", }, { cve: "CVE-2019-2983", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2983", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2983", url: "https://www.suse.com/security/cve/CVE-2019-2983", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2983", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2983", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2983", }, { cve: "CVE-2019-2987", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2987", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2987", url: "https://www.suse.com/security/cve/CVE-2019-2987", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2987", url: "https://bugzilla.suse.com/1154212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2987", }, { cve: "CVE-2019-2988", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2988", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2988", url: "https://www.suse.com/security/cve/CVE-2019-2988", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2988", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2988", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2988", }, { cve: "CVE-2019-2989", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2989", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2989", url: "https://www.suse.com/security/cve/CVE-2019-2989", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2989", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2989", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2989", }, { cve: "CVE-2019-2992", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2992", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2992", url: "https://www.suse.com/security/cve/CVE-2019-2992", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2992", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2992", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2992", }, { cve: "CVE-2019-2999", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2999", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2999", url: "https://www.suse.com/security/cve/CVE-2019-2999", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2999", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2999", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2999", }, { cve: "CVE-2019-7317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-7317", }, ], notes: [ { category: "general", text: "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-7317", url: "https://www.suse.com/security/cve/CVE-2019-7317", }, { category: "external", summary: "SUSE Bug 1124211 for CVE-2019-7317", url: "https://bugzilla.suse.com/1124211", }, { category: "external", summary: "SUSE Bug 1135824 for CVE-2019-7317", url: "https://bugzilla.suse.com/1135824", }, { category: "external", summary: "SUSE Bug 1141780 for CVE-2019-7317", url: "https://bugzilla.suse.com/1141780", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-7317", url: "https://bugzilla.suse.com/1147021", }, { category: "external", summary: "SUSE Bug 1165297 for CVE-2019-7317", url: "https://bugzilla.suse.com/1165297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-7317", }, { cve: "CVE-2020-14556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14556", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14556", url: "https://www.suse.com/security/cve/CVE-2020-14556", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14556", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14556", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14556", }, { cve: "CVE-2020-14562", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14562", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14562", url: "https://www.suse.com/security/cve/CVE-2020-14562", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14562", url: "https://bugzilla.suse.com/1174157", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14562", }, { cve: "CVE-2020-14573", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14573", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14573", url: "https://www.suse.com/security/cve/CVE-2020-14573", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14573", url: "https://bugzilla.suse.com/1174157", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14573", }, { cve: "CVE-2020-14577", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14577", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14577", url: "https://www.suse.com/security/cve/CVE-2020-14577", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14577", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14577", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14577", }, { cve: "CVE-2020-14581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14581", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14581", url: "https://www.suse.com/security/cve/CVE-2020-14581", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14581", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14581", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14581", }, { cve: "CVE-2020-14583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14583", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14583", url: "https://www.suse.com/security/cve/CVE-2020-14583", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14583", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14583", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14583", }, { cve: "CVE-2020-14593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14593", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14593", url: "https://www.suse.com/security/cve/CVE-2020-14593", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14593", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14593", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14593", }, { cve: "CVE-2020-14621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14621", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14621", url: "https://www.suse.com/security/cve/CVE-2020-14621", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14621", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14621", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14621", }, { cve: "CVE-2020-14779", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14779", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14779", url: "https://www.suse.com/security/cve/CVE-2020-14779", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14779", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14779", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14779", }, { cve: "CVE-2020-14781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14781", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14781", url: "https://www.suse.com/security/cve/CVE-2020-14781", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14781", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14781", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14781", }, { cve: "CVE-2020-14782", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14782", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14782", url: "https://www.suse.com/security/cve/CVE-2020-14782", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14782", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14782", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14782", }, { cve: "CVE-2020-14792", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14792", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14792", url: "https://www.suse.com/security/cve/CVE-2020-14792", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14792", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14792", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14792", }, { cve: "CVE-2020-14796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14796", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14796", url: "https://www.suse.com/security/cve/CVE-2020-14796", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14796", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14796", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14796", }, { cve: "CVE-2020-14797", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14797", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14797", url: "https://www.suse.com/security/cve/CVE-2020-14797", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14797", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14797", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14797", }, { cve: "CVE-2020-14798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14798", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14798", url: "https://www.suse.com/security/cve/CVE-2020-14798", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14798", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14798", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14798", }, { cve: "CVE-2020-14803", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14803", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14803", url: "https://www.suse.com/security/cve/CVE-2020-14803", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14803", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1181239 for CVE-2020-14803", url: "https://bugzilla.suse.com/1181239", }, { category: "external", summary: "SUSE Bug 1182186 for CVE-2020-14803", url: "https://bugzilla.suse.com/1182186", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14803", }, { cve: "CVE-2020-2583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2583", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2583", url: "https://www.suse.com/security/cve/CVE-2020-2583", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2583", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1162972 for CVE-2020-2583", url: "https://bugzilla.suse.com/1162972", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2583", }, { cve: "CVE-2020-2590", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2590", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2590", url: "https://www.suse.com/security/cve/CVE-2020-2590", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2590", url: "https://bugzilla.suse.com/1160968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2590", }, { cve: "CVE-2020-2593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2593", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2593", url: "https://www.suse.com/security/cve/CVE-2020-2593", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2593", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1162972 for CVE-2020-2593", url: "https://bugzilla.suse.com/1162972", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2593", }, { cve: "CVE-2020-2601", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2601", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2601", url: "https://www.suse.com/security/cve/CVE-2020-2601", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2601", url: "https://bugzilla.suse.com/1160968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2601", }, { cve: "CVE-2020-2604", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2604", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2604", url: "https://www.suse.com/security/cve/CVE-2020-2604", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2604", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1162972 for CVE-2020-2604", url: "https://bugzilla.suse.com/1162972", }, { category: "external", summary: "SUSE Bug 1165863 for CVE-2020-2604", url: "https://bugzilla.suse.com/1165863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2604", }, { cve: "CVE-2020-2654", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2654", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2654", url: "https://www.suse.com/security/cve/CVE-2020-2654", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2654", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2654", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2654", }, { cve: "CVE-2020-2655", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2655", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2655", url: "https://www.suse.com/security/cve/CVE-2020-2655", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2655", url: "https://bugzilla.suse.com/1160968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2655", }, { cve: "CVE-2020-2754", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2754", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2754", url: "https://www.suse.com/security/cve/CVE-2020-2754", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2754", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2754", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2754", }, { cve: "CVE-2020-2755", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2755", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2755", url: "https://www.suse.com/security/cve/CVE-2020-2755", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2755", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2755", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2755", }, { cve: "CVE-2020-2756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2756", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2756", url: "https://www.suse.com/security/cve/CVE-2020-2756", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2756", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2756", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2756", }, { cve: "CVE-2020-2757", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2757", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2757", url: "https://www.suse.com/security/cve/CVE-2020-2757", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2757", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2757", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2757", }, { cve: "CVE-2020-2767", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2767", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2767", url: "https://www.suse.com/security/cve/CVE-2020-2767", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2767", url: "https://bugzilla.suse.com/1169511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2767", }, { cve: "CVE-2020-2773", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2773", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2773", url: "https://www.suse.com/security/cve/CVE-2020-2773", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2773", url: "https://bugzilla.suse.com/1169511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2773", }, { cve: "CVE-2020-2778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2778", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2778", url: "https://www.suse.com/security/cve/CVE-2020-2778", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2778", url: "https://bugzilla.suse.com/1169511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2778", }, { cve: "CVE-2020-2781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2781", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2781", url: "https://www.suse.com/security/cve/CVE-2020-2781", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2781", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2781", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2781", }, { cve: "CVE-2020-2800", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2800", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2800", url: "https://www.suse.com/security/cve/CVE-2020-2800", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2800", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2800", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2800", }, { cve: "CVE-2020-2803", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2803", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2803", url: "https://www.suse.com/security/cve/CVE-2020-2803", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2803", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2803", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2803", }, { cve: "CVE-2020-2805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2805", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2805", url: "https://www.suse.com/security/cve/CVE-2020-2805", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2805", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2805", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2805", }, { cve: "CVE-2020-2816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2816", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2816", url: "https://www.suse.com/security/cve/CVE-2020-2816", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2816", url: "https://bugzilla.suse.com/1169511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2816", }, { cve: "CVE-2020-2830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2830", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2830", url: "https://www.suse.com/security/cve/CVE-2020-2830", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2830", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2830", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2830", }, { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2163", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2163", url: "https://www.suse.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "SUSE Bug 1185055 for CVE-2021-2163", url: "https://bugzilla.suse.com/1185055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2163", }, { cve: "CVE-2021-2341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2341", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2341", url: "https://www.suse.com/security/cve/CVE-2021-2341", }, { category: "external", summary: "SUSE Bug 1188564 for CVE-2021-2341", url: "https://bugzilla.suse.com/1188564", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-2341", }, { cve: "CVE-2021-2369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2369", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2369", url: "https://www.suse.com/security/cve/CVE-2021-2369", }, { category: "external", summary: "SUSE Bug 1188565 for CVE-2021-2369", url: "https://bugzilla.suse.com/1188565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2369", }, { cve: "CVE-2021-2388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2388", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2388", url: "https://www.suse.com/security/cve/CVE-2021-2388", }, { category: "external", summary: "SUSE Bug 1188566 for CVE-2021-2388", url: "https://bugzilla.suse.com/1188566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-2388", }, ], }
opensuse-su-2024:10871-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "java-11-openjdk-11.0.12.0-3.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the java-11-openjdk-11.0.12.0-3.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10871", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10871-1.json", }, { category: "self", summary: "SUSE CVE CVE-2018-11212 page", url: "https://www.suse.com/security/cve/CVE-2018-11212/", }, { category: "self", summary: "SUSE CVE CVE-2018-2790 page", url: "https://www.suse.com/security/cve/CVE-2018-2790/", }, { category: "self", summary: "SUSE CVE CVE-2018-2794 page", url: "https://www.suse.com/security/cve/CVE-2018-2794/", }, { category: "self", summary: "SUSE CVE CVE-2018-2795 page", url: "https://www.suse.com/security/cve/CVE-2018-2795/", }, { category: "self", summary: "SUSE CVE CVE-2018-2796 page", url: "https://www.suse.com/security/cve/CVE-2018-2796/", }, { category: "self", summary: "SUSE CVE CVE-2018-2797 page", url: "https://www.suse.com/security/cve/CVE-2018-2797/", }, { category: "self", summary: "SUSE CVE CVE-2018-2798 page", url: "https://www.suse.com/security/cve/CVE-2018-2798/", }, { category: "self", summary: "SUSE CVE CVE-2018-2799 page", url: "https://www.suse.com/security/cve/CVE-2018-2799/", }, { category: "self", summary: "SUSE CVE CVE-2018-2814 page", url: "https://www.suse.com/security/cve/CVE-2018-2814/", }, { category: "self", summary: "SUSE CVE CVE-2018-2825 page", url: "https://www.suse.com/security/cve/CVE-2018-2825/", }, { category: "self", summary: "SUSE CVE CVE-2018-2826 page", url: "https://www.suse.com/security/cve/CVE-2018-2826/", }, { category: "self", summary: "SUSE CVE CVE-2018-2940 page", url: "https://www.suse.com/security/cve/CVE-2018-2940/", }, { category: "self", summary: "SUSE CVE CVE-2018-2952 page", url: "https://www.suse.com/security/cve/CVE-2018-2952/", }, { category: "self", summary: "SUSE CVE CVE-2018-2972 page", url: "https://www.suse.com/security/cve/CVE-2018-2972/", }, { category: "self", summary: "SUSE CVE CVE-2018-2973 page", url: "https://www.suse.com/security/cve/CVE-2018-2973/", }, { category: "self", summary: "SUSE CVE CVE-2018-3136 page", url: "https://www.suse.com/security/cve/CVE-2018-3136/", }, { category: "self", summary: "SUSE CVE CVE-2018-3139 page", url: "https://www.suse.com/security/cve/CVE-2018-3139/", }, { category: "self", summary: "SUSE CVE CVE-2018-3149 page", url: "https://www.suse.com/security/cve/CVE-2018-3149/", }, { category: "self", summary: "SUSE CVE CVE-2018-3150 page", url: "https://www.suse.com/security/cve/CVE-2018-3150/", }, { category: "self", summary: "SUSE CVE CVE-2018-3157 page", url: "https://www.suse.com/security/cve/CVE-2018-3157/", }, { category: "self", summary: "SUSE CVE CVE-2018-3169 page", url: "https://www.suse.com/security/cve/CVE-2018-3169/", }, { category: "self", summary: "SUSE CVE CVE-2018-3180 page", url: "https://www.suse.com/security/cve/CVE-2018-3180/", }, { category: "self", summary: "SUSE CVE CVE-2018-3183 page", url: "https://www.suse.com/security/cve/CVE-2018-3183/", }, { category: "self", summary: "SUSE CVE CVE-2019-2422 page", url: "https://www.suse.com/security/cve/CVE-2019-2422/", }, { category: "self", summary: "SUSE CVE CVE-2019-2426 page", url: "https://www.suse.com/security/cve/CVE-2019-2426/", }, { category: "self", summary: "SUSE CVE CVE-2019-2602 page", url: "https://www.suse.com/security/cve/CVE-2019-2602/", }, { category: "self", summary: "SUSE CVE CVE-2019-2684 page", url: "https://www.suse.com/security/cve/CVE-2019-2684/", }, { category: "self", summary: "SUSE CVE CVE-2019-2745 page", url: "https://www.suse.com/security/cve/CVE-2019-2745/", }, { category: "self", summary: "SUSE CVE CVE-2019-2762 page", url: "https://www.suse.com/security/cve/CVE-2019-2762/", }, { category: "self", summary: "SUSE CVE CVE-2019-2766 page", url: "https://www.suse.com/security/cve/CVE-2019-2766/", }, { category: "self", summary: "SUSE CVE CVE-2019-2769 page", url: "https://www.suse.com/security/cve/CVE-2019-2769/", }, { category: "self", summary: "SUSE CVE CVE-2019-2786 page", url: "https://www.suse.com/security/cve/CVE-2019-2786/", }, { category: "self", summary: "SUSE CVE CVE-2019-2816 page", url: "https://www.suse.com/security/cve/CVE-2019-2816/", }, { category: "self", summary: "SUSE CVE CVE-2019-2818 page", url: "https://www.suse.com/security/cve/CVE-2019-2818/", }, { category: "self", summary: "SUSE CVE CVE-2019-2821 page", url: "https://www.suse.com/security/cve/CVE-2019-2821/", }, { category: "self", summary: "SUSE CVE CVE-2019-2894 page", url: "https://www.suse.com/security/cve/CVE-2019-2894/", }, { category: "self", summary: "SUSE CVE CVE-2019-2933 page", url: "https://www.suse.com/security/cve/CVE-2019-2933/", }, { category: "self", summary: "SUSE CVE CVE-2019-2945 page", url: "https://www.suse.com/security/cve/CVE-2019-2945/", }, { category: "self", summary: "SUSE CVE CVE-2019-2949 page", url: "https://www.suse.com/security/cve/CVE-2019-2949/", }, { category: "self", summary: "SUSE CVE CVE-2019-2958 page", url: "https://www.suse.com/security/cve/CVE-2019-2958/", }, { category: "self", summary: "SUSE CVE CVE-2019-2962 page", url: "https://www.suse.com/security/cve/CVE-2019-2962/", }, { category: "self", summary: "SUSE CVE CVE-2019-2964 page", url: "https://www.suse.com/security/cve/CVE-2019-2964/", }, { category: "self", summary: "SUSE CVE CVE-2019-2973 page", url: "https://www.suse.com/security/cve/CVE-2019-2973/", }, { category: "self", summary: "SUSE CVE CVE-2019-2975 page", url: "https://www.suse.com/security/cve/CVE-2019-2975/", }, { category: "self", summary: "SUSE CVE CVE-2019-2977 page", url: "https://www.suse.com/security/cve/CVE-2019-2977/", }, { category: "self", summary: "SUSE CVE CVE-2019-2978 page", url: "https://www.suse.com/security/cve/CVE-2019-2978/", }, { category: "self", summary: "SUSE CVE CVE-2019-2981 page", url: "https://www.suse.com/security/cve/CVE-2019-2981/", }, { category: "self", summary: "SUSE CVE CVE-2019-2983 page", url: "https://www.suse.com/security/cve/CVE-2019-2983/", }, { category: "self", summary: "SUSE CVE CVE-2019-2987 page", url: "https://www.suse.com/security/cve/CVE-2019-2987/", }, { category: "self", summary: "SUSE CVE CVE-2019-2988 page", url: "https://www.suse.com/security/cve/CVE-2019-2988/", }, { category: "self", summary: "SUSE CVE CVE-2019-2989 page", url: "https://www.suse.com/security/cve/CVE-2019-2989/", }, { category: "self", summary: "SUSE CVE CVE-2019-2992 page", url: "https://www.suse.com/security/cve/CVE-2019-2992/", }, { category: "self", summary: "SUSE CVE CVE-2019-2999 page", url: "https://www.suse.com/security/cve/CVE-2019-2999/", }, { category: "self", summary: "SUSE CVE CVE-2019-7317 page", url: "https://www.suse.com/security/cve/CVE-2019-7317/", }, { category: "self", summary: "SUSE CVE CVE-2020-14556 page", url: "https://www.suse.com/security/cve/CVE-2020-14556/", }, { category: "self", summary: "SUSE CVE CVE-2020-14562 page", url: "https://www.suse.com/security/cve/CVE-2020-14562/", }, { category: "self", summary: "SUSE CVE CVE-2020-14573 page", url: "https://www.suse.com/security/cve/CVE-2020-14573/", }, { category: "self", summary: "SUSE CVE CVE-2020-14577 page", url: "https://www.suse.com/security/cve/CVE-2020-14577/", }, { category: "self", summary: "SUSE CVE CVE-2020-14581 page", url: "https://www.suse.com/security/cve/CVE-2020-14581/", }, { category: "self", summary: "SUSE CVE CVE-2020-14583 page", url: "https://www.suse.com/security/cve/CVE-2020-14583/", }, { category: "self", summary: "SUSE CVE CVE-2020-14593 page", url: "https://www.suse.com/security/cve/CVE-2020-14593/", }, { category: "self", summary: "SUSE CVE CVE-2020-14621 page", url: "https://www.suse.com/security/cve/CVE-2020-14621/", }, { category: "self", summary: "SUSE CVE CVE-2020-14779 page", url: "https://www.suse.com/security/cve/CVE-2020-14779/", }, { category: "self", summary: "SUSE CVE CVE-2020-14781 page", url: "https://www.suse.com/security/cve/CVE-2020-14781/", }, { category: "self", summary: "SUSE CVE CVE-2020-14782 page", url: "https://www.suse.com/security/cve/CVE-2020-14782/", }, { category: "self", summary: "SUSE CVE CVE-2020-14792 page", url: "https://www.suse.com/security/cve/CVE-2020-14792/", }, { category: "self", summary: "SUSE CVE CVE-2020-14796 page", url: "https://www.suse.com/security/cve/CVE-2020-14796/", }, { category: "self", summary: "SUSE CVE CVE-2020-14797 page", url: "https://www.suse.com/security/cve/CVE-2020-14797/", }, { category: "self", summary: "SUSE CVE CVE-2020-14798 page", url: "https://www.suse.com/security/cve/CVE-2020-14798/", }, { category: "self", summary: "SUSE CVE CVE-2020-14803 page", url: "https://www.suse.com/security/cve/CVE-2020-14803/", }, { category: "self", summary: "SUSE CVE CVE-2020-2583 page", url: "https://www.suse.com/security/cve/CVE-2020-2583/", }, { category: "self", summary: "SUSE CVE CVE-2020-2590 page", url: "https://www.suse.com/security/cve/CVE-2020-2590/", }, { category: "self", summary: "SUSE CVE CVE-2020-2593 page", url: "https://www.suse.com/security/cve/CVE-2020-2593/", }, { category: "self", summary: "SUSE CVE CVE-2020-2601 page", url: "https://www.suse.com/security/cve/CVE-2020-2601/", }, { category: "self", summary: "SUSE CVE CVE-2020-2604 page", url: "https://www.suse.com/security/cve/CVE-2020-2604/", }, { category: "self", summary: "SUSE CVE CVE-2020-2654 page", url: "https://www.suse.com/security/cve/CVE-2020-2654/", }, { category: "self", summary: "SUSE CVE CVE-2020-2655 page", url: "https://www.suse.com/security/cve/CVE-2020-2655/", }, { category: "self", summary: "SUSE CVE CVE-2020-2754 page", url: "https://www.suse.com/security/cve/CVE-2020-2754/", }, { category: "self", summary: "SUSE CVE CVE-2020-2755 page", url: "https://www.suse.com/security/cve/CVE-2020-2755/", }, { category: "self", summary: "SUSE CVE CVE-2020-2756 page", url: "https://www.suse.com/security/cve/CVE-2020-2756/", }, { category: "self", summary: "SUSE CVE CVE-2020-2757 page", url: "https://www.suse.com/security/cve/CVE-2020-2757/", }, { category: "self", summary: "SUSE CVE CVE-2020-2767 page", url: "https://www.suse.com/security/cve/CVE-2020-2767/", }, { category: "self", summary: "SUSE CVE CVE-2020-2773 page", url: "https://www.suse.com/security/cve/CVE-2020-2773/", }, { category: "self", summary: "SUSE CVE CVE-2020-2778 page", url: "https://www.suse.com/security/cve/CVE-2020-2778/", }, { category: "self", summary: "SUSE CVE CVE-2020-2781 page", url: "https://www.suse.com/security/cve/CVE-2020-2781/", }, { category: "self", summary: "SUSE CVE CVE-2020-2800 page", url: "https://www.suse.com/security/cve/CVE-2020-2800/", }, { category: "self", summary: "SUSE CVE CVE-2020-2803 page", url: "https://www.suse.com/security/cve/CVE-2020-2803/", }, { category: "self", summary: "SUSE CVE CVE-2020-2805 page", url: "https://www.suse.com/security/cve/CVE-2020-2805/", }, { category: "self", summary: "SUSE CVE CVE-2020-2816 page", url: "https://www.suse.com/security/cve/CVE-2020-2816/", }, { category: "self", summary: "SUSE CVE CVE-2020-2830 page", url: "https://www.suse.com/security/cve/CVE-2020-2830/", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2163 page", url: "https://www.suse.com/security/cve/CVE-2021-2163/", }, { category: "self", summary: "SUSE CVE CVE-2021-2341 page", url: "https://www.suse.com/security/cve/CVE-2021-2341/", }, { category: "self", summary: "SUSE CVE CVE-2021-2369 page", url: "https://www.suse.com/security/cve/CVE-2021-2369/", }, { category: "self", summary: "SUSE CVE CVE-2021-2388 page", url: "https://www.suse.com/security/cve/CVE-2021-2388/", }, ], title: "java-11-openjdk-11.0.12.0-3.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10871-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.12.0-3.1.aarch64", product: { name: "java-11-openjdk-11.0.12.0-3.1.aarch64", product_id: "java-11-openjdk-11.0.12.0-3.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", product: { name: "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", product_id: "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", product: { name: "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", product_id: "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", product: { name: "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", product_id: "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", product: { name: "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", product_id: "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", product: { name: "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", product_id: "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", product: { name: "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", product_id: "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.12.0-3.1.aarch64", product: { name: "java-11-openjdk-src-11.0.12.0-3.1.aarch64", product_id: "java-11-openjdk-src-11.0.12.0-3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.12.0-3.1.ppc64le", product: { name: "java-11-openjdk-11.0.12.0-3.1.ppc64le", product_id: "java-11-openjdk-11.0.12.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", product: { name: "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", product_id: "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", product: { name: "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", product_id: "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", product: { name: "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", product_id: "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", product: { name: "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", product_id: "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", product: { name: "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", product_id: "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", product: { name: "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", product_id: "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", product: { name: "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", product_id: "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.12.0-3.1.s390x", product: { name: "java-11-openjdk-11.0.12.0-3.1.s390x", product_id: "java-11-openjdk-11.0.12.0-3.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", product: { name: "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", product_id: "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.12.0-3.1.s390x", product: { name: "java-11-openjdk-demo-11.0.12.0-3.1.s390x", product_id: "java-11-openjdk-demo-11.0.12.0-3.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.12.0-3.1.s390x", product: { name: "java-11-openjdk-devel-11.0.12.0-3.1.s390x", product_id: "java-11-openjdk-devel-11.0.12.0-3.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.12.0-3.1.s390x", product: { name: "java-11-openjdk-headless-11.0.12.0-3.1.s390x", product_id: "java-11-openjdk-headless-11.0.12.0-3.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", product: { name: "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", product_id: "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", product: { name: "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", product_id: "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.12.0-3.1.s390x", product: { name: "java-11-openjdk-src-11.0.12.0-3.1.s390x", product_id: "java-11-openjdk-src-11.0.12.0-3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.12.0-3.1.x86_64", product: { name: "java-11-openjdk-11.0.12.0-3.1.x86_64", product_id: "java-11-openjdk-11.0.12.0-3.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", product: { name: "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", product_id: "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", product: { name: "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", product_id: "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", product: { name: "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", product_id: "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", product: { name: "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", product_id: "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", product: { name: "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", product_id: "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", product: { name: "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", product_id: "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.12.0-3.1.x86_64", product: { name: "java-11-openjdk-src-11.0.12.0-3.1.x86_64", product_id: "java-11-openjdk-src-11.0.12.0-3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", }, product_reference: "java-11-openjdk-11.0.12.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", }, product_reference: "java-11-openjdk-11.0.12.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", }, product_reference: "java-11-openjdk-11.0.12.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", }, product_reference: "java-11-openjdk-11.0.12.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", }, product_reference: "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", }, product_reference: "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", }, product_reference: "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", }, product_reference: "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", }, product_reference: "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", }, product_reference: "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", }, product_reference: "java-11-openjdk-demo-11.0.12.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", }, product_reference: "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", }, product_reference: "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", }, product_reference: "java-11-openjdk-devel-11.0.12.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", }, product_reference: "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", }, product_reference: "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", }, product_reference: "java-11-openjdk-headless-11.0.12.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", }, product_reference: "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", }, product_reference: "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", }, product_reference: "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", }, product_reference: "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", }, product_reference: "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", }, product_reference: "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-jmods-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", }, product_reference: "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", }, product_reference: "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-src-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", }, product_reference: "java-11-openjdk-src-11.0.12.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-src-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", }, product_reference: "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-src-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", }, product_reference: "java-11-openjdk-src-11.0.12.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-src-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", }, product_reference: "java-11-openjdk-src-11.0.12.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2018-11212", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-11212", }, ], notes: [ { category: "general", text: "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-11212", url: "https://www.suse.com/security/cve/CVE-2018-11212", }, { category: "external", summary: "SUSE Bug 1122299 for CVE-2018-11212", url: "https://bugzilla.suse.com/1122299", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-11212", }, { cve: "CVE-2018-2790", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2790", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2790", url: "https://www.suse.com/security/cve/CVE-2018-2790", }, { category: "external", summary: "SUSE Bug 1090023 for CVE-2018-2790", url: "https://bugzilla.suse.com/1090023", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2790", url: "https://bugzilla.suse.com/1093311", }, { category: "external", summary: "SUSE Bug 1101637 for CVE-2018-2790", url: "https://bugzilla.suse.com/1101637", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-2790", }, { cve: "CVE-2018-2794", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2794", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2794", url: "https://www.suse.com/security/cve/CVE-2018-2794", }, { category: "external", summary: "SUSE Bug 1090024 for CVE-2018-2794", url: "https://bugzilla.suse.com/1090024", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2794", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2794", }, { cve: "CVE-2018-2795", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2795", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2795", url: "https://www.suse.com/security/cve/CVE-2018-2795", }, { category: "external", summary: "SUSE Bug 1090025 for CVE-2018-2795", url: "https://bugzilla.suse.com/1090025", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2795", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2795", }, { cve: "CVE-2018-2796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2796", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2796", url: "https://www.suse.com/security/cve/CVE-2018-2796", }, { category: "external", summary: "SUSE Bug 1090026 for CVE-2018-2796", url: "https://bugzilla.suse.com/1090026", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2796", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2796", }, { cve: "CVE-2018-2797", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2797", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2797", url: "https://www.suse.com/security/cve/CVE-2018-2797", }, { category: "external", summary: "SUSE Bug 1090027 for CVE-2018-2797", url: "https://bugzilla.suse.com/1090027", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2797", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2797", }, { cve: "CVE-2018-2798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2798", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2798", url: "https://www.suse.com/security/cve/CVE-2018-2798", }, { category: "external", summary: "SUSE Bug 1090028 for CVE-2018-2798", url: "https://bugzilla.suse.com/1090028", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2798", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2798", }, { cve: "CVE-2018-2799", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2799", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2799", url: "https://www.suse.com/security/cve/CVE-2018-2799", }, { category: "external", summary: "SUSE Bug 1090029 for CVE-2018-2799", url: "https://bugzilla.suse.com/1090029", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2799", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2799", }, { cve: "CVE-2018-2814", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2814", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2814", url: "https://www.suse.com/security/cve/CVE-2018-2814", }, { category: "external", summary: "SUSE Bug 1090032 for CVE-2018-2814", url: "https://bugzilla.suse.com/1090032", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2814", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2814", }, { cve: "CVE-2018-2825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2825", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2825", url: "https://www.suse.com/security/cve/CVE-2018-2825", }, { category: "external", summary: "SUSE Bug 1090196 for CVE-2018-2825", url: "https://bugzilla.suse.com/1090196", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2825", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2825", }, { cve: "CVE-2018-2826", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2826", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2826", url: "https://www.suse.com/security/cve/CVE-2018-2826", }, { category: "external", summary: "SUSE Bug 1090197 for CVE-2018-2826", url: "https://bugzilla.suse.com/1090197", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2826", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2826", }, { cve: "CVE-2018-2940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2940", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2940", url: "https://www.suse.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2940", }, { cve: "CVE-2018-2952", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2952", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2952", url: "https://www.suse.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101651 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101651", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2952", }, { cve: "CVE-2018-2972", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2972", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2972", url: "https://www.suse.com/security/cve/CVE-2018-2972", }, { category: "external", summary: "SUSE Bug 1101655 for CVE-2018-2972", url: "https://bugzilla.suse.com/1101655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2972", }, { cve: "CVE-2018-2973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2973", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2973", url: "https://www.suse.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2973", }, { cve: "CVE-2018-3136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3136", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3136", url: "https://www.suse.com/security/cve/CVE-2018-3136", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3136", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3136", }, { cve: "CVE-2018-3139", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3139", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3139", url: "https://www.suse.com/security/cve/CVE-2018-3139", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3139", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3139", }, { cve: "CVE-2018-3149", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3149", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3149", url: "https://www.suse.com/security/cve/CVE-2018-3149", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3149", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-3149", }, { cve: "CVE-2018-3150", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3150", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3150", url: "https://www.suse.com/security/cve/CVE-2018-3150", }, { category: "external", summary: "SUSE Bug 1112145 for CVE-2018-3150", url: "https://bugzilla.suse.com/1112145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3150", }, { cve: "CVE-2018-3157", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3157", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Sound). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3157", url: "https://www.suse.com/security/cve/CVE-2018-3157", }, { category: "external", summary: "SUSE Bug 1112149 for CVE-2018-3157", url: "https://bugzilla.suse.com/1112149", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3157", }, { cve: "CVE-2018-3169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3169", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3169", url: "https://www.suse.com/security/cve/CVE-2018-3169", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3169", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-3169", }, { cve: "CVE-2018-3180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3180", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3180", url: "https://www.suse.com/security/cve/CVE-2018-3180", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112147 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112147", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3180", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-3180", }, { cve: "CVE-2018-3183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3183", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3183", url: "https://www.suse.com/security/cve/CVE-2018-3183", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3183", url: "https://bugzilla.suse.com/1116574", }, { category: "external", summary: "SUSE Bug 1120714 for CVE-2018-3183", url: "https://bugzilla.suse.com/1120714", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-3183", }, { cve: "CVE-2019-2422", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2422", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2422", url: "https://www.suse.com/security/cve/CVE-2019-2422", }, { category: "external", summary: "SUSE Bug 1122293 for CVE-2019-2422", url: "https://bugzilla.suse.com/1122293", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2422", }, { cve: "CVE-2019-2426", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2426", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2426", url: "https://www.suse.com/security/cve/CVE-2019-2426", }, { category: "external", summary: "SUSE Bug 1134297 for CVE-2019-2426", url: "https://bugzilla.suse.com/1134297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2426", }, { cve: "CVE-2019-2602", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2602", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2602", url: "https://www.suse.com/security/cve/CVE-2019-2602", }, { category: "external", summary: "SUSE Bug 1132728 for CVE-2019-2602", url: "https://bugzilla.suse.com/1132728", }, { category: "external", summary: "SUSE Bug 1134718 for CVE-2019-2602", url: "https://bugzilla.suse.com/1134718", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2602", }, { cve: "CVE-2019-2684", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2684", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2684", url: "https://www.suse.com/security/cve/CVE-2019-2684", }, { category: "external", summary: "SUSE Bug 1132732 for CVE-2019-2684", url: "https://bugzilla.suse.com/1132732", }, { category: "external", summary: "SUSE Bug 1134718 for CVE-2019-2684", url: "https://bugzilla.suse.com/1134718", }, { category: "external", summary: "SUSE Bug 1184734 for CVE-2019-2684", url: "https://bugzilla.suse.com/1184734", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2684", }, { cve: "CVE-2019-2745", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2745", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2745", url: "https://www.suse.com/security/cve/CVE-2019-2745", }, { category: "external", summary: "SUSE Bug 1141784 for CVE-2019-2745", url: "https://bugzilla.suse.com/1141784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2745", }, { cve: "CVE-2019-2762", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2762", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2762", url: "https://www.suse.com/security/cve/CVE-2019-2762", }, { category: "external", summary: "SUSE Bug 1141782 for CVE-2019-2762", url: "https://bugzilla.suse.com/1141782", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2762", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2762", }, { cve: "CVE-2019-2766", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2766", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2766", url: "https://www.suse.com/security/cve/CVE-2019-2766", }, { category: "external", summary: "SUSE Bug 1141789 for CVE-2019-2766", url: "https://bugzilla.suse.com/1141789", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2766", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2766", }, { cve: "CVE-2019-2769", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2769", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2769", url: "https://www.suse.com/security/cve/CVE-2019-2769", }, { category: "external", summary: "SUSE Bug 1141783 for CVE-2019-2769", url: "https://bugzilla.suse.com/1141783", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2769", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2769", }, { cve: "CVE-2019-2786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2786", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2786", url: "https://www.suse.com/security/cve/CVE-2019-2786", }, { category: "external", summary: "SUSE Bug 1141787 for CVE-2019-2786", url: "https://bugzilla.suse.com/1141787", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2786", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2786", }, { cve: "CVE-2019-2816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2816", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2816", url: "https://www.suse.com/security/cve/CVE-2019-2816", }, { category: "external", summary: "SUSE Bug 1141785 for CVE-2019-2816", url: "https://bugzilla.suse.com/1141785", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2816", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2816", }, { cve: "CVE-2019-2818", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2818", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2818", url: "https://www.suse.com/security/cve/CVE-2019-2818", }, { category: "external", summary: "SUSE Bug 1141788 for CVE-2019-2818", url: "https://bugzilla.suse.com/1141788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2818", }, { cve: "CVE-2019-2821", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2821", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2821", url: "https://www.suse.com/security/cve/CVE-2019-2821", }, { category: "external", summary: "SUSE Bug 1141781 for CVE-2019-2821", url: "https://bugzilla.suse.com/1141781", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2821", }, { cve: "CVE-2019-2894", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2894", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2894", url: "https://www.suse.com/security/cve/CVE-2019-2894", }, { category: "external", summary: "SUSE Bug 1152856 for CVE-2019-2894", url: "https://bugzilla.suse.com/1152856", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2894", url: "https://bugzilla.suse.com/1154212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2894", }, { cve: "CVE-2019-2933", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2933", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2933", url: "https://www.suse.com/security/cve/CVE-2019-2933", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2933", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2933", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2933", }, { cve: "CVE-2019-2945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2945", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2945", url: "https://www.suse.com/security/cve/CVE-2019-2945", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2945", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2945", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2945", }, { cve: "CVE-2019-2949", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2949", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2949", url: "https://www.suse.com/security/cve/CVE-2019-2949", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2949", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2019-2949", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2949", }, { cve: "CVE-2019-2958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2958", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2958", url: "https://www.suse.com/security/cve/CVE-2019-2958", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2958", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2958", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2958", }, { cve: "CVE-2019-2962", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2962", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2962", url: "https://www.suse.com/security/cve/CVE-2019-2962", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2962", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2962", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2962", }, { cve: "CVE-2019-2964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2964", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2964", url: "https://www.suse.com/security/cve/CVE-2019-2964", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2964", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2964", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2964", }, { cve: "CVE-2019-2973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2973", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2973", url: "https://www.suse.com/security/cve/CVE-2019-2973", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2973", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2973", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2973", }, { cve: "CVE-2019-2975", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2975", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2975", url: "https://www.suse.com/security/cve/CVE-2019-2975", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2975", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2975", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2975", }, { cve: "CVE-2019-2977", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2977", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.8 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2977", url: "https://www.suse.com/security/cve/CVE-2019-2977", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2977", url: "https://bugzilla.suse.com/1154212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2977", }, { cve: "CVE-2019-2978", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2978", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2978", url: "https://www.suse.com/security/cve/CVE-2019-2978", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2978", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2978", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2978", }, { cve: "CVE-2019-2981", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2981", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2981", url: "https://www.suse.com/security/cve/CVE-2019-2981", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2981", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2981", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2981", }, { cve: "CVE-2019-2983", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2983", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2983", url: "https://www.suse.com/security/cve/CVE-2019-2983", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2983", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2983", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2983", }, { cve: "CVE-2019-2987", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2987", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2987", url: "https://www.suse.com/security/cve/CVE-2019-2987", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2987", url: "https://bugzilla.suse.com/1154212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2987", }, { cve: "CVE-2019-2988", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2988", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2988", url: "https://www.suse.com/security/cve/CVE-2019-2988", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2988", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2988", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2988", }, { cve: "CVE-2019-2989", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2989", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2989", url: "https://www.suse.com/security/cve/CVE-2019-2989", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2989", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2989", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2989", }, { cve: "CVE-2019-2992", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2992", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2992", url: "https://www.suse.com/security/cve/CVE-2019-2992", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2992", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2992", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2992", }, { cve: "CVE-2019-2999", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2999", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2999", url: "https://www.suse.com/security/cve/CVE-2019-2999", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2999", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2999", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2999", }, { cve: "CVE-2019-7317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-7317", }, ], notes: [ { category: "general", text: "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-7317", url: "https://www.suse.com/security/cve/CVE-2019-7317", }, { category: "external", summary: "SUSE Bug 1124211 for CVE-2019-7317", url: "https://bugzilla.suse.com/1124211", }, { category: "external", summary: "SUSE Bug 1135824 for CVE-2019-7317", url: "https://bugzilla.suse.com/1135824", }, { category: "external", summary: "SUSE Bug 1141780 for CVE-2019-7317", url: "https://bugzilla.suse.com/1141780", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-7317", url: "https://bugzilla.suse.com/1147021", }, { category: "external", summary: "SUSE Bug 1165297 for CVE-2019-7317", url: "https://bugzilla.suse.com/1165297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-7317", }, { cve: "CVE-2020-14556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14556", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14556", url: "https://www.suse.com/security/cve/CVE-2020-14556", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14556", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14556", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14556", }, { cve: "CVE-2020-14562", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14562", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14562", url: "https://www.suse.com/security/cve/CVE-2020-14562", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14562", url: "https://bugzilla.suse.com/1174157", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14562", }, { cve: "CVE-2020-14573", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14573", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14573", url: "https://www.suse.com/security/cve/CVE-2020-14573", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14573", url: "https://bugzilla.suse.com/1174157", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14573", }, { cve: "CVE-2020-14577", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14577", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14577", url: "https://www.suse.com/security/cve/CVE-2020-14577", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14577", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14577", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14577", }, { cve: "CVE-2020-14581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14581", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14581", url: "https://www.suse.com/security/cve/CVE-2020-14581", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14581", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14581", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14581", }, { cve: "CVE-2020-14583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14583", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14583", url: "https://www.suse.com/security/cve/CVE-2020-14583", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14583", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14583", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14583", }, { cve: "CVE-2020-14593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14593", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14593", url: "https://www.suse.com/security/cve/CVE-2020-14593", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14593", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14593", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14593", }, { cve: "CVE-2020-14621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14621", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14621", url: "https://www.suse.com/security/cve/CVE-2020-14621", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14621", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14621", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14621", }, { cve: "CVE-2020-14779", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14779", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14779", url: "https://www.suse.com/security/cve/CVE-2020-14779", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14779", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14779", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14779", }, { cve: "CVE-2020-14781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14781", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14781", url: "https://www.suse.com/security/cve/CVE-2020-14781", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14781", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14781", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14781", }, { cve: "CVE-2020-14782", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14782", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14782", url: "https://www.suse.com/security/cve/CVE-2020-14782", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14782", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14782", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14782", }, { cve: "CVE-2020-14792", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14792", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14792", url: "https://www.suse.com/security/cve/CVE-2020-14792", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14792", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14792", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14792", }, { cve: "CVE-2020-14796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14796", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14796", url: "https://www.suse.com/security/cve/CVE-2020-14796", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14796", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14796", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14796", }, { cve: "CVE-2020-14797", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14797", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14797", url: "https://www.suse.com/security/cve/CVE-2020-14797", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14797", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14797", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14797", }, { cve: "CVE-2020-14798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14798", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14798", url: "https://www.suse.com/security/cve/CVE-2020-14798", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14798", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14798", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14798", }, { cve: "CVE-2020-14803", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14803", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14803", url: "https://www.suse.com/security/cve/CVE-2020-14803", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14803", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1181239 for CVE-2020-14803", url: "https://bugzilla.suse.com/1181239", }, { category: "external", summary: "SUSE Bug 1182186 for CVE-2020-14803", url: "https://bugzilla.suse.com/1182186", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14803", }, { cve: "CVE-2020-2583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2583", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2583", url: "https://www.suse.com/security/cve/CVE-2020-2583", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2583", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1162972 for CVE-2020-2583", url: "https://bugzilla.suse.com/1162972", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2583", }, { cve: "CVE-2020-2590", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2590", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2590", url: "https://www.suse.com/security/cve/CVE-2020-2590", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2590", url: "https://bugzilla.suse.com/1160968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2590", }, { cve: "CVE-2020-2593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2593", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2593", url: "https://www.suse.com/security/cve/CVE-2020-2593", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2593", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1162972 for CVE-2020-2593", url: "https://bugzilla.suse.com/1162972", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2593", }, { cve: "CVE-2020-2601", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2601", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2601", url: "https://www.suse.com/security/cve/CVE-2020-2601", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2601", url: "https://bugzilla.suse.com/1160968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2601", }, { cve: "CVE-2020-2604", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2604", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2604", url: "https://www.suse.com/security/cve/CVE-2020-2604", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2604", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1162972 for CVE-2020-2604", url: "https://bugzilla.suse.com/1162972", }, { category: "external", summary: "SUSE Bug 1165863 for CVE-2020-2604", url: "https://bugzilla.suse.com/1165863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2604", }, { cve: "CVE-2020-2654", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2654", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2654", url: "https://www.suse.com/security/cve/CVE-2020-2654", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2654", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2654", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2654", }, { cve: "CVE-2020-2655", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2655", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2655", url: "https://www.suse.com/security/cve/CVE-2020-2655", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2655", url: "https://bugzilla.suse.com/1160968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2655", }, { cve: "CVE-2020-2754", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2754", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2754", url: "https://www.suse.com/security/cve/CVE-2020-2754", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2754", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2754", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2754", }, { cve: "CVE-2020-2755", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2755", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2755", url: "https://www.suse.com/security/cve/CVE-2020-2755", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2755", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2755", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2755", }, { cve: "CVE-2020-2756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2756", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2756", url: "https://www.suse.com/security/cve/CVE-2020-2756", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2756", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2756", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2756", }, { cve: "CVE-2020-2757", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2757", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2757", url: "https://www.suse.com/security/cve/CVE-2020-2757", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2757", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2757", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2757", }, { cve: "CVE-2020-2767", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2767", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2767", url: "https://www.suse.com/security/cve/CVE-2020-2767", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2767", url: "https://bugzilla.suse.com/1169511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2767", }, { cve: "CVE-2020-2773", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2773", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2773", url: "https://www.suse.com/security/cve/CVE-2020-2773", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2773", url: "https://bugzilla.suse.com/1169511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2773", }, { cve: "CVE-2020-2778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2778", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2778", url: "https://www.suse.com/security/cve/CVE-2020-2778", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2778", url: "https://bugzilla.suse.com/1169511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2778", }, { cve: "CVE-2020-2781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2781", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2781", url: "https://www.suse.com/security/cve/CVE-2020-2781", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2781", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2781", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2781", }, { cve: "CVE-2020-2800", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2800", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2800", url: "https://www.suse.com/security/cve/CVE-2020-2800", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2800", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2800", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2800", }, { cve: "CVE-2020-2803", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2803", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2803", url: "https://www.suse.com/security/cve/CVE-2020-2803", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2803", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2803", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2803", }, { cve: "CVE-2020-2805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2805", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2805", url: "https://www.suse.com/security/cve/CVE-2020-2805", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2805", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2805", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2805", }, { cve: "CVE-2020-2816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2816", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2816", url: "https://www.suse.com/security/cve/CVE-2020-2816", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2816", url: "https://bugzilla.suse.com/1169511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2816", }, { cve: "CVE-2020-2830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2830", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2830", url: "https://www.suse.com/security/cve/CVE-2020-2830", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2830", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2830", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2830", }, { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2163", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2163", url: "https://www.suse.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "SUSE Bug 1185055 for CVE-2021-2163", url: "https://bugzilla.suse.com/1185055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2163", }, { cve: "CVE-2021-2341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2341", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2341", url: "https://www.suse.com/security/cve/CVE-2021-2341", }, { category: "external", summary: "SUSE Bug 1188564 for CVE-2021-2341", url: "https://bugzilla.suse.com/1188564", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-2341", }, { cve: "CVE-2021-2369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2369", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2369", url: "https://www.suse.com/security/cve/CVE-2021-2369", }, { category: "external", summary: "SUSE Bug 1188565 for CVE-2021-2369", url: "https://bugzilla.suse.com/1188565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2369", }, { cve: "CVE-2021-2388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2388", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2388", url: "https://www.suse.com/security/cve/CVE-2021-2388", }, { category: "external", summary: "SUSE Bug 1188566 for CVE-2021-2388", url: "https://bugzilla.suse.com/1188566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-2388", }, ], }
opensuse-su-2021:0719-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-11-openjdk", title: "Title of the patch", }, { category: "description", text: "This update for java-11-openjdk fixes the following issues:\n\n- Update to upstream tag jdk-11.0.11+9 (April 2021 CPU)\n * CVE-2021-2163: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055)\n * CVE-2021-2161: Fixed incorrect handling of partially quoted arguments in ProcessBuilder (bsc#1185056)\n- moved mozilla-nss dependency to java-11-openjdk-headless package, this is necessary to be able to do crypto \n with just java-11-openjdk-headless installed (bsc#1184606).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-719", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0719-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:0719-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGMX3TVL2LOHFGYNJZIU2YSG4IKEZZAM/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:0719-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGMX3TVL2LOHFGYNJZIU2YSG4IKEZZAM/", }, { category: "self", summary: "SUSE Bug 1184606", url: "https://bugzilla.suse.com/1184606", }, { category: "self", summary: "SUSE Bug 1185055", url: "https://bugzilla.suse.com/1185055", }, { category: "self", summary: "SUSE Bug 1185056", url: "https://bugzilla.suse.com/1185056", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2163 page", url: "https://www.suse.com/security/cve/CVE-2021-2163/", }, ], title: "Security update for java-11-openjdk", tracking: { current_release_date: "2021-05-13T17:21:54Z", generator: { date: "2021-05-13T17:21:54Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:0719-1", initial_release_date: "2021-05-13T17:21:54Z", revision_history: [ { date: "2021-05-13T17:21:54Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.11.0-lp152.2.12.1.i586", product: { name: "java-11-openjdk-11.0.11.0-lp152.2.12.1.i586", product_id: "java-11-openjdk-11.0.11.0-lp152.2.12.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.i586", product: { name: "java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.i586", product_id: "java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.i586", product: { name: "java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.i586", product_id: "java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.i586", product: { name: "java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.i586", product_id: "java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.i586", product: { name: "java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.i586", product_id: "java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.i586", product: { name: "java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.i586", product_id: "java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.11.0-lp152.2.12.1.i586", product: { name: "java-11-openjdk-src-11.0.11.0-lp152.2.12.1.i586", product_id: "java-11-openjdk-src-11.0.11.0-lp152.2.12.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1.noarch", product: { name: "java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1.noarch", product_id: "java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.11.0-lp152.2.12.1.x86_64", product: { name: "java-11-openjdk-11.0.11.0-lp152.2.12.1.x86_64", product_id: "java-11-openjdk-11.0.11.0-lp152.2.12.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.x86_64", product: { name: "java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.x86_64", product_id: "java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.x86_64", product: { name: "java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.x86_64", product_id: "java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.x86_64", product: { name: "java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.x86_64", product_id: "java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.x86_64", product: { name: "java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.x86_64", product_id: "java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.x86_64", product: { name: "java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.x86_64", product_id: "java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.11.0-lp152.2.12.1.x86_64", product: { name: "java-11-openjdk-src-11.0.11.0-lp152.2.12.1.x86_64", product_id: "java-11-openjdk-src-11.0.11.0-lp152.2.12.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-lp152.2.12.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.i586", }, product_reference: "java-11-openjdk-11.0.11.0-lp152.2.12.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-lp152.2.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-lp152.2.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.i586", }, product_reference: "java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.x86_64", }, product_reference: "java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.i586", }, product_reference: "java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.i586", }, product_reference: "java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.i586", }, product_reference: "java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1.noarch", }, product_reference: "java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.i586", }, product_reference: "java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.x86_64", }, product_reference: "java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-src-11.0.11.0-lp152.2.12.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.i586", }, product_reference: "java-11-openjdk-src-11.0.11.0-lp152.2.12.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-src-11.0.11.0-lp152.2.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.x86_64", }, product_reference: "java-11-openjdk-src-11.0.11.0-lp152.2.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-05-13T17:21:54Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2163", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2163", url: "https://www.suse.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "SUSE Bug 1185055 for CVE-2021-2163", url: "https://bugzilla.suse.com/1185055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.11.0-lp152.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-05-13T17:21:54Z", details: "moderate", }, ], title: "CVE-2021-2163", }, ], }
opensuse-su-2024:10876-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "java-1_8_0-openjdk-1.8.0.302-2.2 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.302-2.2 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10876", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10876-1.json", }, { category: "self", summary: "SUSE CVE CVE-2016-10165 page", url: "https://www.suse.com/security/cve/CVE-2016-10165/", }, { category: "self", summary: "SUSE CVE CVE-2016-2183 page", url: "https://www.suse.com/security/cve/CVE-2016-2183/", }, { category: "self", summary: "SUSE CVE CVE-2016-5546 page", url: "https://www.suse.com/security/cve/CVE-2016-5546/", }, { category: "self", summary: "SUSE CVE CVE-2016-5547 page", url: "https://www.suse.com/security/cve/CVE-2016-5547/", }, { category: "self", summary: "SUSE CVE CVE-2016-5548 page", url: "https://www.suse.com/security/cve/CVE-2016-5548/", }, { category: "self", summary: "SUSE CVE CVE-2016-5549 page", url: "https://www.suse.com/security/cve/CVE-2016-5549/", }, { category: "self", summary: "SUSE CVE CVE-2016-5552 page", url: "https://www.suse.com/security/cve/CVE-2016-5552/", }, { category: "self", summary: "SUSE CVE CVE-2016-9840 page", url: "https://www.suse.com/security/cve/CVE-2016-9840/", }, { category: "self", summary: "SUSE CVE CVE-2016-9843 page", url: "https://www.suse.com/security/cve/CVE-2016-9843/", }, { category: "self", summary: "SUSE CVE CVE-2017-10053 page", url: "https://www.suse.com/security/cve/CVE-2017-10053/", }, { category: "self", summary: "SUSE CVE CVE-2017-10067 page", url: "https://www.suse.com/security/cve/CVE-2017-10067/", }, { category: "self", summary: "SUSE CVE CVE-2017-10074 page", url: "https://www.suse.com/security/cve/CVE-2017-10074/", }, { category: "self", summary: "SUSE CVE CVE-2017-10078 page", url: "https://www.suse.com/security/cve/CVE-2017-10078/", }, { category: "self", summary: "SUSE CVE CVE-2017-10081 page", url: "https://www.suse.com/security/cve/CVE-2017-10081/", }, { category: "self", summary: "SUSE CVE CVE-2017-10086 page", url: "https://www.suse.com/security/cve/CVE-2017-10086/", }, { category: "self", summary: "SUSE CVE CVE-2017-10087 page", url: "https://www.suse.com/security/cve/CVE-2017-10087/", }, { category: "self", summary: "SUSE CVE CVE-2017-10089 page", url: "https://www.suse.com/security/cve/CVE-2017-10089/", }, { category: "self", summary: "SUSE CVE CVE-2017-10090 page", url: "https://www.suse.com/security/cve/CVE-2017-10090/", }, { category: "self", summary: "SUSE CVE CVE-2017-10096 page", url: "https://www.suse.com/security/cve/CVE-2017-10096/", }, { category: "self", summary: "SUSE CVE CVE-2017-10101 page", url: "https://www.suse.com/security/cve/CVE-2017-10101/", }, { category: "self", summary: "SUSE CVE CVE-2017-10102 page", url: "https://www.suse.com/security/cve/CVE-2017-10102/", }, { category: "self", summary: "SUSE CVE CVE-2017-10105 page", url: "https://www.suse.com/security/cve/CVE-2017-10105/", }, { category: "self", summary: "SUSE CVE CVE-2017-10107 page", url: "https://www.suse.com/security/cve/CVE-2017-10107/", }, { category: "self", summary: "SUSE CVE CVE-2017-10108 page", url: "https://www.suse.com/security/cve/CVE-2017-10108/", }, { category: "self", summary: "SUSE CVE CVE-2017-10109 page", url: "https://www.suse.com/security/cve/CVE-2017-10109/", }, { category: "self", summary: "SUSE CVE CVE-2017-10110 page", url: "https://www.suse.com/security/cve/CVE-2017-10110/", }, { category: "self", summary: "SUSE CVE CVE-2017-10111 page", url: "https://www.suse.com/security/cve/CVE-2017-10111/", }, { category: "self", summary: "SUSE CVE CVE-2017-10114 page", url: "https://www.suse.com/security/cve/CVE-2017-10114/", }, { category: "self", summary: "SUSE CVE CVE-2017-10115 page", url: "https://www.suse.com/security/cve/CVE-2017-10115/", }, { category: "self", summary: "SUSE CVE CVE-2017-10116 page", url: "https://www.suse.com/security/cve/CVE-2017-10116/", }, { category: "self", summary: "SUSE CVE CVE-2017-10118 page", url: "https://www.suse.com/security/cve/CVE-2017-10118/", }, { category: "self", summary: "SUSE CVE CVE-2017-10125 page", url: "https://www.suse.com/security/cve/CVE-2017-10125/", }, { category: "self", summary: "SUSE CVE CVE-2017-10135 page", url: "https://www.suse.com/security/cve/CVE-2017-10135/", }, { category: "self", summary: "SUSE CVE CVE-2017-10176 page", url: "https://www.suse.com/security/cve/CVE-2017-10176/", }, { category: "self", summary: "SUSE CVE CVE-2017-10193 page", url: "https://www.suse.com/security/cve/CVE-2017-10193/", }, { category: "self", summary: "SUSE CVE CVE-2017-10198 page", url: "https://www.suse.com/security/cve/CVE-2017-10198/", }, { category: "self", summary: "SUSE CVE CVE-2017-10243 page", url: "https://www.suse.com/security/cve/CVE-2017-10243/", }, { category: "self", summary: "SUSE CVE CVE-2017-10274 page", url: "https://www.suse.com/security/cve/CVE-2017-10274/", }, { category: "self", summary: "SUSE CVE CVE-2017-10281 page", url: "https://www.suse.com/security/cve/CVE-2017-10281/", }, { category: "self", summary: "SUSE CVE CVE-2017-10285 page", url: "https://www.suse.com/security/cve/CVE-2017-10285/", }, { category: "self", summary: "SUSE CVE CVE-2017-10295 page", url: "https://www.suse.com/security/cve/CVE-2017-10295/", }, { category: "self", summary: "SUSE CVE CVE-2017-10345 page", url: "https://www.suse.com/security/cve/CVE-2017-10345/", }, { category: "self", summary: "SUSE CVE CVE-2017-10346 page", url: "https://www.suse.com/security/cve/CVE-2017-10346/", }, { category: "self", summary: "SUSE CVE CVE-2017-10347 page", url: "https://www.suse.com/security/cve/CVE-2017-10347/", }, { category: "self", summary: "SUSE CVE CVE-2017-10348 page", url: "https://www.suse.com/security/cve/CVE-2017-10348/", }, { category: "self", summary: "SUSE CVE CVE-2017-10349 page", url: "https://www.suse.com/security/cve/CVE-2017-10349/", }, { category: "self", summary: "SUSE CVE CVE-2017-10350 page", url: "https://www.suse.com/security/cve/CVE-2017-10350/", }, { category: "self", summary: "SUSE CVE CVE-2017-10355 page", url: "https://www.suse.com/security/cve/CVE-2017-10355/", }, { category: "self", summary: "SUSE CVE CVE-2017-10356 page", url: "https://www.suse.com/security/cve/CVE-2017-10356/", }, { category: "self", summary: "SUSE CVE CVE-2017-10357 page", url: "https://www.suse.com/security/cve/CVE-2017-10357/", }, { category: "self", summary: "SUSE CVE CVE-2017-10388 page", url: "https://www.suse.com/security/cve/CVE-2017-10388/", }, { category: "self", summary: "SUSE CVE CVE-2017-3231 page", url: "https://www.suse.com/security/cve/CVE-2017-3231/", }, { category: "self", summary: "SUSE CVE CVE-2017-3241 page", url: "https://www.suse.com/security/cve/CVE-2017-3241/", }, { category: "self", summary: "SUSE CVE CVE-2017-3252 page", url: "https://www.suse.com/security/cve/CVE-2017-3252/", }, { category: "self", summary: "SUSE CVE CVE-2017-3253 page", url: "https://www.suse.com/security/cve/CVE-2017-3253/", }, { category: "self", summary: "SUSE CVE CVE-2017-3260 page", url: "https://www.suse.com/security/cve/CVE-2017-3260/", }, { category: "self", summary: "SUSE CVE CVE-2017-3261 page", url: "https://www.suse.com/security/cve/CVE-2017-3261/", }, { category: "self", summary: "SUSE CVE CVE-2017-3272 page", url: "https://www.suse.com/security/cve/CVE-2017-3272/", }, { category: "self", summary: "SUSE CVE CVE-2017-3289 page", url: "https://www.suse.com/security/cve/CVE-2017-3289/", }, { category: "self", summary: "SUSE CVE CVE-2017-3509 page", url: "https://www.suse.com/security/cve/CVE-2017-3509/", }, { category: "self", summary: "SUSE CVE CVE-2017-3511 page", url: "https://www.suse.com/security/cve/CVE-2017-3511/", }, { category: "self", summary: "SUSE CVE CVE-2017-3512 page", url: "https://www.suse.com/security/cve/CVE-2017-3512/", }, { category: "self", summary: "SUSE CVE CVE-2017-3514 page", url: "https://www.suse.com/security/cve/CVE-2017-3514/", }, { category: "self", summary: "SUSE CVE CVE-2017-3526 page", url: "https://www.suse.com/security/cve/CVE-2017-3526/", }, { category: "self", summary: "SUSE CVE CVE-2017-3533 page", url: "https://www.suse.com/security/cve/CVE-2017-3533/", }, { category: "self", summary: "SUSE CVE CVE-2017-3539 page", url: "https://www.suse.com/security/cve/CVE-2017-3539/", }, { category: "self", summary: "SUSE CVE CVE-2017-3544 page", url: "https://www.suse.com/security/cve/CVE-2017-3544/", }, { category: "self", summary: "SUSE CVE CVE-2018-11212 page", url: "https://www.suse.com/security/cve/CVE-2018-11212/", }, { category: "self", summary: "SUSE CVE CVE-2018-13785 page", url: "https://www.suse.com/security/cve/CVE-2018-13785/", }, { category: "self", summary: "SUSE CVE CVE-2018-16435 page", url: "https://www.suse.com/security/cve/CVE-2018-16435/", }, { category: "self", summary: "SUSE CVE CVE-2018-2579 page", url: "https://www.suse.com/security/cve/CVE-2018-2579/", }, { category: "self", summary: "SUSE CVE CVE-2018-2582 page", url: "https://www.suse.com/security/cve/CVE-2018-2582/", }, { category: "self", summary: "SUSE CVE CVE-2018-2588 page", url: "https://www.suse.com/security/cve/CVE-2018-2588/", }, { category: "self", summary: "SUSE CVE CVE-2018-2599 page", url: "https://www.suse.com/security/cve/CVE-2018-2599/", }, { category: "self", summary: "SUSE CVE CVE-2018-2602 page", url: "https://www.suse.com/security/cve/CVE-2018-2602/", }, { category: "self", summary: "SUSE CVE CVE-2018-2603 page", url: "https://www.suse.com/security/cve/CVE-2018-2603/", }, { category: "self", summary: "SUSE CVE CVE-2018-2618 page", url: "https://www.suse.com/security/cve/CVE-2018-2618/", }, { category: "self", summary: "SUSE CVE CVE-2018-2629 page", url: "https://www.suse.com/security/cve/CVE-2018-2629/", }, { category: "self", summary: "SUSE CVE CVE-2018-2633 page", url: "https://www.suse.com/security/cve/CVE-2018-2633/", }, { category: "self", summary: "SUSE CVE CVE-2018-2634 page", url: "https://www.suse.com/security/cve/CVE-2018-2634/", }, { category: "self", summary: "SUSE CVE CVE-2018-2637 page", url: "https://www.suse.com/security/cve/CVE-2018-2637/", }, { category: "self", summary: "SUSE CVE CVE-2018-2641 page", url: "https://www.suse.com/security/cve/CVE-2018-2641/", }, { category: "self", summary: "SUSE CVE CVE-2018-2663 page", url: "https://www.suse.com/security/cve/CVE-2018-2663/", }, { category: "self", summary: "SUSE CVE CVE-2018-2677 page", url: "https://www.suse.com/security/cve/CVE-2018-2677/", }, { category: "self", summary: "SUSE CVE CVE-2018-2678 page", url: "https://www.suse.com/security/cve/CVE-2018-2678/", }, { category: "self", summary: "SUSE CVE CVE-2018-2790 page", url: "https://www.suse.com/security/cve/CVE-2018-2790/", }, { category: "self", summary: "SUSE CVE CVE-2018-2794 page", url: "https://www.suse.com/security/cve/CVE-2018-2794/", }, { category: "self", summary: "SUSE CVE CVE-2018-2795 page", url: "https://www.suse.com/security/cve/CVE-2018-2795/", }, { category: "self", summary: "SUSE CVE CVE-2018-2796 page", url: "https://www.suse.com/security/cve/CVE-2018-2796/", }, { category: "self", summary: "SUSE CVE CVE-2018-2797 page", url: "https://www.suse.com/security/cve/CVE-2018-2797/", }, { category: "self", summary: "SUSE CVE CVE-2018-2798 page", url: "https://www.suse.com/security/cve/CVE-2018-2798/", }, { category: "self", summary: "SUSE CVE CVE-2018-2799 page", url: "https://www.suse.com/security/cve/CVE-2018-2799/", }, { category: "self", summary: "SUSE CVE CVE-2018-2800 page", url: "https://www.suse.com/security/cve/CVE-2018-2800/", }, { category: "self", summary: "SUSE CVE CVE-2018-2814 page", url: "https://www.suse.com/security/cve/CVE-2018-2814/", }, { category: "self", summary: "SUSE CVE CVE-2018-2815 page", url: "https://www.suse.com/security/cve/CVE-2018-2815/", }, { category: "self", summary: "SUSE CVE CVE-2018-2938 page", url: "https://www.suse.com/security/cve/CVE-2018-2938/", }, { category: "self", summary: "SUSE CVE CVE-2018-2940 page", url: "https://www.suse.com/security/cve/CVE-2018-2940/", }, { category: "self", summary: "SUSE CVE CVE-2018-2952 page", url: "https://www.suse.com/security/cve/CVE-2018-2952/", }, { category: "self", summary: "SUSE CVE CVE-2018-2973 page", url: "https://www.suse.com/security/cve/CVE-2018-2973/", }, { category: "self", summary: "SUSE CVE CVE-2018-3136 page", url: "https://www.suse.com/security/cve/CVE-2018-3136/", }, { category: "self", summary: "SUSE CVE CVE-2018-3139 page", url: "https://www.suse.com/security/cve/CVE-2018-3139/", }, { category: "self", summary: "SUSE CVE CVE-2018-3149 page", url: "https://www.suse.com/security/cve/CVE-2018-3149/", }, { category: "self", summary: "SUSE CVE CVE-2018-3169 page", url: "https://www.suse.com/security/cve/CVE-2018-3169/", }, { category: "self", summary: "SUSE CVE CVE-2018-3180 page", url: "https://www.suse.com/security/cve/CVE-2018-3180/", }, { category: "self", summary: "SUSE CVE CVE-2018-3183 page", url: "https://www.suse.com/security/cve/CVE-2018-3183/", }, { category: "self", summary: "SUSE CVE CVE-2018-3214 page", url: "https://www.suse.com/security/cve/CVE-2018-3214/", }, { category: "self", summary: "SUSE CVE CVE-2018-3639 page", url: "https://www.suse.com/security/cve/CVE-2018-3639/", }, { category: "self", summary: "SUSE CVE CVE-2019-2422 page", url: "https://www.suse.com/security/cve/CVE-2019-2422/", }, { category: "self", summary: "SUSE CVE CVE-2019-2426 page", url: "https://www.suse.com/security/cve/CVE-2019-2426/", }, { category: "self", summary: "SUSE CVE CVE-2019-2602 page", url: "https://www.suse.com/security/cve/CVE-2019-2602/", }, { category: "self", summary: "SUSE CVE CVE-2019-2684 page", url: "https://www.suse.com/security/cve/CVE-2019-2684/", }, { category: "self", summary: "SUSE CVE CVE-2019-2698 page", url: "https://www.suse.com/security/cve/CVE-2019-2698/", }, { category: "self", summary: "SUSE CVE CVE-2019-2745 page", url: "https://www.suse.com/security/cve/CVE-2019-2745/", }, { category: "self", summary: "SUSE CVE CVE-2019-2762 page", url: "https://www.suse.com/security/cve/CVE-2019-2762/", }, { category: "self", summary: "SUSE CVE CVE-2019-2766 page", url: "https://www.suse.com/security/cve/CVE-2019-2766/", }, { category: "self", summary: "SUSE CVE CVE-2019-2769 page", url: "https://www.suse.com/security/cve/CVE-2019-2769/", }, { category: "self", summary: "SUSE CVE CVE-2019-2786 page", url: "https://www.suse.com/security/cve/CVE-2019-2786/", }, { category: "self", summary: "SUSE CVE CVE-2019-2816 page", url: "https://www.suse.com/security/cve/CVE-2019-2816/", }, { category: "self", summary: "SUSE CVE CVE-2019-2842 page", url: "https://www.suse.com/security/cve/CVE-2019-2842/", }, { category: "self", summary: "SUSE CVE CVE-2019-2894 page", url: "https://www.suse.com/security/cve/CVE-2019-2894/", }, { category: "self", summary: "SUSE CVE CVE-2019-2933 page", url: "https://www.suse.com/security/cve/CVE-2019-2933/", }, { category: "self", summary: "SUSE CVE CVE-2019-2945 page", url: "https://www.suse.com/security/cve/CVE-2019-2945/", }, { category: "self", summary: "SUSE CVE CVE-2019-2949 page", url: "https://www.suse.com/security/cve/CVE-2019-2949/", }, { category: "self", summary: "SUSE CVE CVE-2019-2958 page", url: "https://www.suse.com/security/cve/CVE-2019-2958/", }, { category: "self", summary: "SUSE CVE CVE-2019-2962 page", url: "https://www.suse.com/security/cve/CVE-2019-2962/", }, { category: "self", summary: "SUSE CVE CVE-2019-2964 page", url: "https://www.suse.com/security/cve/CVE-2019-2964/", }, { category: "self", summary: "SUSE CVE CVE-2019-2973 page", url: "https://www.suse.com/security/cve/CVE-2019-2973/", }, { category: "self", summary: "SUSE CVE CVE-2019-2975 page", url: "https://www.suse.com/security/cve/CVE-2019-2975/", }, { category: "self", summary: "SUSE CVE CVE-2019-2978 page", url: "https://www.suse.com/security/cve/CVE-2019-2978/", }, { category: "self", summary: "SUSE CVE CVE-2019-2981 page", url: "https://www.suse.com/security/cve/CVE-2019-2981/", }, { category: "self", summary: "SUSE CVE CVE-2019-2983 page", url: "https://www.suse.com/security/cve/CVE-2019-2983/", }, { category: "self", summary: "SUSE CVE CVE-2019-2987 page", url: "https://www.suse.com/security/cve/CVE-2019-2987/", }, { category: "self", summary: "SUSE CVE CVE-2019-2988 page", url: "https://www.suse.com/security/cve/CVE-2019-2988/", }, { category: "self", summary: "SUSE CVE CVE-2019-2989 page", url: "https://www.suse.com/security/cve/CVE-2019-2989/", }, { category: "self", summary: "SUSE CVE CVE-2019-2992 page", url: "https://www.suse.com/security/cve/CVE-2019-2992/", }, { category: "self", summary: "SUSE CVE CVE-2019-2999 page", url: "https://www.suse.com/security/cve/CVE-2019-2999/", }, { category: "self", summary: "SUSE CVE CVE-2019-7317 page", url: "https://www.suse.com/security/cve/CVE-2019-7317/", }, { category: "self", summary: "SUSE CVE CVE-2020-14556 page", url: "https://www.suse.com/security/cve/CVE-2020-14556/", }, { category: "self", summary: "SUSE CVE CVE-2020-14577 page", url: "https://www.suse.com/security/cve/CVE-2020-14577/", }, { category: "self", summary: "SUSE CVE CVE-2020-14578 page", url: "https://www.suse.com/security/cve/CVE-2020-14578/", }, { category: "self", summary: "SUSE CVE CVE-2020-14579 page", url: "https://www.suse.com/security/cve/CVE-2020-14579/", }, { category: "self", summary: "SUSE CVE CVE-2020-14581 page", url: "https://www.suse.com/security/cve/CVE-2020-14581/", }, { category: "self", summary: "SUSE CVE CVE-2020-14583 page", url: "https://www.suse.com/security/cve/CVE-2020-14583/", }, { category: "self", summary: "SUSE CVE CVE-2020-14593 page", url: "https://www.suse.com/security/cve/CVE-2020-14593/", }, { category: "self", summary: "SUSE CVE CVE-2020-14621 page", url: "https://www.suse.com/security/cve/CVE-2020-14621/", }, { category: "self", summary: "SUSE CVE CVE-2020-14779 page", url: "https://www.suse.com/security/cve/CVE-2020-14779/", }, { category: "self", summary: "SUSE CVE CVE-2020-14781 page", url: "https://www.suse.com/security/cve/CVE-2020-14781/", }, { category: "self", summary: "SUSE CVE CVE-2020-14782 page", url: "https://www.suse.com/security/cve/CVE-2020-14782/", }, { category: "self", summary: "SUSE CVE CVE-2020-14792 page", url: "https://www.suse.com/security/cve/CVE-2020-14792/", }, { category: "self", summary: "SUSE CVE CVE-2020-14796 page", url: "https://www.suse.com/security/cve/CVE-2020-14796/", }, { category: "self", summary: "SUSE CVE CVE-2020-14797 page", url: "https://www.suse.com/security/cve/CVE-2020-14797/", }, { category: "self", summary: "SUSE CVE CVE-2020-14798 page", url: "https://www.suse.com/security/cve/CVE-2020-14798/", }, { category: "self", summary: "SUSE CVE CVE-2020-14803 page", url: "https://www.suse.com/security/cve/CVE-2020-14803/", }, { category: "self", summary: "SUSE CVE CVE-2020-2583 page", url: "https://www.suse.com/security/cve/CVE-2020-2583/", }, { category: "self", summary: "SUSE CVE CVE-2020-2590 page", url: "https://www.suse.com/security/cve/CVE-2020-2590/", }, { category: "self", summary: "SUSE CVE CVE-2020-2593 page", url: "https://www.suse.com/security/cve/CVE-2020-2593/", }, { category: "self", summary: "SUSE CVE CVE-2020-2601 page", url: "https://www.suse.com/security/cve/CVE-2020-2601/", }, { category: "self", summary: "SUSE CVE CVE-2020-2604 page", url: "https://www.suse.com/security/cve/CVE-2020-2604/", }, { category: "self", summary: "SUSE CVE CVE-2020-2654 page", url: "https://www.suse.com/security/cve/CVE-2020-2654/", }, { category: "self", summary: "SUSE CVE CVE-2020-2659 page", url: "https://www.suse.com/security/cve/CVE-2020-2659/", }, { category: "self", summary: "SUSE CVE CVE-2020-2754 page", url: "https://www.suse.com/security/cve/CVE-2020-2754/", }, { category: "self", summary: "SUSE CVE CVE-2020-2755 page", url: "https://www.suse.com/security/cve/CVE-2020-2755/", }, { category: "self", summary: "SUSE CVE CVE-2020-2756 page", url: "https://www.suse.com/security/cve/CVE-2020-2756/", }, { category: "self", summary: "SUSE CVE CVE-2020-2757 page", url: "https://www.suse.com/security/cve/CVE-2020-2757/", }, { category: "self", summary: "SUSE CVE CVE-2020-2773 page", url: "https://www.suse.com/security/cve/CVE-2020-2773/", }, { category: "self", summary: "SUSE CVE CVE-2020-2781 page", url: "https://www.suse.com/security/cve/CVE-2020-2781/", }, { category: "self", summary: "SUSE CVE CVE-2020-2800 page", url: "https://www.suse.com/security/cve/CVE-2020-2800/", }, { category: "self", summary: "SUSE CVE CVE-2020-2803 page", url: "https://www.suse.com/security/cve/CVE-2020-2803/", }, { category: "self", summary: "SUSE CVE CVE-2020-2805 page", url: "https://www.suse.com/security/cve/CVE-2020-2805/", }, { category: "self", summary: "SUSE CVE CVE-2020-2830 page", url: "https://www.suse.com/security/cve/CVE-2020-2830/", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2163 page", url: "https://www.suse.com/security/cve/CVE-2021-2163/", }, { category: "self", summary: "SUSE CVE CVE-2021-2341 page", url: "https://www.suse.com/security/cve/CVE-2021-2341/", }, { category: "self", summary: "SUSE CVE CVE-2021-2369 page", url: "https://www.suse.com/security/cve/CVE-2021-2369/", }, { category: "self", summary: "SUSE CVE CVE-2021-2388 page", url: "https://www.suse.com/security/cve/CVE-2021-2388/", }, ], title: "java-1_8_0-openjdk-1.8.0.302-2.2 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10876-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", product: { name: "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", product_id: "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", product: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", product_id: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", product_id: "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", product: { name: "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", product_id: "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", product: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", product_id: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", product_id: "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-2.2.s390x", product: { name: "java-1_8_0-openjdk-1.8.0.302-2.2.s390x", product_id: "java-1_8_0-openjdk-1.8.0.302-2.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", product: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", product_id: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", product_id: "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", product: { name: "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", product_id: "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", product: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", product_id: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", product_id: "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", }, product_reference: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", }, product_reference: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", }, product_reference: "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", }, product_reference: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", }, product_reference: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", }, product_reference: "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", }, product_reference: "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", }, product_reference: "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", }, product_reference: "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2016-10165", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10165", }, ], notes: [ { category: "general", text: "The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-10165", url: "https://www.suse.com/security/cve/CVE-2016-10165", }, { category: "external", summary: "SUSE Bug 1021364 for CVE-2016-10165", url: "https://bugzilla.suse.com/1021364", }, { category: "external", summary: "SUSE Bug 1064069 for CVE-2016-10165", url: "https://bugzilla.suse.com/1064069", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2016-10165", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-10165", }, { cve: "CVE-2016-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2183", }, ], notes: [ { category: "general", text: "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2183", url: "https://www.suse.com/security/cve/CVE-2016-2183", }, { category: "external", summary: "SUSE Bug 1001912 for CVE-2016-2183", url: "https://bugzilla.suse.com/1001912", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2016-2183", url: "https://bugzilla.suse.com/1024218", }, { category: "external", summary: "SUSE Bug 1027038 for CVE-2016-2183", url: "https://bugzilla.suse.com/1027038", }, { category: "external", summary: "SUSE Bug 1034689 for CVE-2016-2183", url: "https://bugzilla.suse.com/1034689", }, { category: "external", summary: "SUSE Bug 1056614 for CVE-2016-2183", url: "https://bugzilla.suse.com/1056614", }, { category: "external", summary: "SUSE Bug 1171693 for CVE-2016-2183", url: "https://bugzilla.suse.com/1171693", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2183", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995359 for CVE-2016-2183", url: "https://bugzilla.suse.com/995359", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-2183", }, { cve: "CVE-2016-5546", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5546", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5546", url: "https://www.suse.com/security/cve/CVE-2016-5546", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2016-5546", url: "https://bugzilla.suse.com/1020905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-5546", }, { cve: "CVE-2016-5547", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5547", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Availability impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5547", url: "https://www.suse.com/security/cve/CVE-2016-5547", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2016-5547", url: "https://bugzilla.suse.com/1020905", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2016-5547", url: "https://bugzilla.suse.com/1024218", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5547", }, { cve: "CVE-2016-5548", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5548", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5548", url: "https://www.suse.com/security/cve/CVE-2016-5548", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2016-5548", url: "https://bugzilla.suse.com/1020905", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2016-5548", url: "https://bugzilla.suse.com/1024218", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-5548", }, { cve: "CVE-2016-5549", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5549", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5549", url: "https://www.suse.com/security/cve/CVE-2016-5549", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2016-5549", url: "https://bugzilla.suse.com/1020905", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2016-5549", url: "https://bugzilla.suse.com/1024218", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-5549", }, { cve: "CVE-2016-5552", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5552", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Integrity impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5552", url: "https://www.suse.com/security/cve/CVE-2016-5552", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2016-5552", url: "https://bugzilla.suse.com/1020905", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2016-5552", url: "https://bugzilla.suse.com/1024218", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5552", }, { cve: "CVE-2016-9840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9840", }, ], notes: [ { category: "general", text: "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9840", url: "https://www.suse.com/security/cve/CVE-2016-9840", }, { category: "external", summary: "SUSE Bug 1003579 for CVE-2016-9840", url: "https://bugzilla.suse.com/1003579", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9840", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1023215 for CVE-2016-9840", url: "https://bugzilla.suse.com/1023215", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9840", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9840", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9840", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9840", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9840", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9840", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-9840", }, { cve: "CVE-2016-9843", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9843", }, ], notes: [ { category: "general", text: "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9843", url: "https://www.suse.com/security/cve/CVE-2016-9843", }, { category: "external", summary: "SUSE Bug 1003580 for CVE-2016-9843", url: "https://bugzilla.suse.com/1003580", }, { category: "external", summary: "SUSE Bug 1013882 for CVE-2016-9843", url: "https://bugzilla.suse.com/1013882", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9843", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9843", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1116686 for CVE-2016-9843", url: "https://bugzilla.suse.com/1116686", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9843", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9843", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9843", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9843", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-9843", }, { cve: "CVE-2017-10053", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10053", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10053", url: "https://www.suse.com/security/cve/CVE-2017-10053", }, { category: "external", summary: "SUSE Bug 1049305 for CVE-2017-10053", url: "https://bugzilla.suse.com/1049305", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10053", }, { cve: "CVE-2017-10067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10067", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10067", url: "https://www.suse.com/security/cve/CVE-2017-10067", }, { category: "external", summary: "SUSE Bug 1049306 for CVE-2017-10067", url: "https://bugzilla.suse.com/1049306", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10067", }, { cve: "CVE-2017-10074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10074", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10074", url: "https://www.suse.com/security/cve/CVE-2017-10074", }, { category: "external", summary: "SUSE Bug 1049307 for CVE-2017-10074", url: "https://bugzilla.suse.com/1049307", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10074", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10074", }, { cve: "CVE-2017-10078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10078", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Scripting). The supported version that is affected is Java SE: 8u131. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10078", url: "https://www.suse.com/security/cve/CVE-2017-10078", }, { category: "external", summary: "SUSE Bug 1049308 for CVE-2017-10078", url: "https://bugzilla.suse.com/1049308", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10078", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10078", }, { cve: "CVE-2017-10081", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10081", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10081", url: "https://www.suse.com/security/cve/CVE-2017-10081", }, { category: "external", summary: "SUSE Bug 1049309 for CVE-2017-10081", url: "https://bugzilla.suse.com/1049309", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10081", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10081", }, { cve: "CVE-2017-10086", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10086", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10086", url: "https://www.suse.com/security/cve/CVE-2017-10086", }, { category: "external", summary: "SUSE Bug 1049310 for CVE-2017-10086", url: "https://bugzilla.suse.com/1049310", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10086", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10086", }, { cve: "CVE-2017-10087", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10087", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10087", url: "https://www.suse.com/security/cve/CVE-2017-10087", }, { category: "external", summary: "SUSE Bug 1049311 for CVE-2017-10087", url: "https://bugzilla.suse.com/1049311", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10087", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10087", }, { cve: "CVE-2017-10089", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10089", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: ImageIO). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10089", url: "https://www.suse.com/security/cve/CVE-2017-10089", }, { category: "external", summary: "SUSE Bug 1049312 for CVE-2017-10089", url: "https://bugzilla.suse.com/1049312", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10089", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10089", }, { cve: "CVE-2017-10090", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10090", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10090", url: "https://www.suse.com/security/cve/CVE-2017-10090", }, { category: "external", summary: "SUSE Bug 1049313 for CVE-2017-10090", url: "https://bugzilla.suse.com/1049313", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10090", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10090", }, { cve: "CVE-2017-10096", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10096", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10096", url: "https://www.suse.com/security/cve/CVE-2017-10096", }, { category: "external", summary: "SUSE Bug 1049314 for CVE-2017-10096", url: "https://bugzilla.suse.com/1049314", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10096", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10096", }, { cve: "CVE-2017-10101", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10101", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10101", url: "https://www.suse.com/security/cve/CVE-2017-10101", }, { category: "external", summary: "SUSE Bug 1049315 for CVE-2017-10101", url: "https://bugzilla.suse.com/1049315", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10101", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10101", }, { cve: "CVE-2017-10102", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10102", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10102", url: "https://www.suse.com/security/cve/CVE-2017-10102", }, { category: "external", summary: "SUSE Bug 1049316 for CVE-2017-10102", url: "https://bugzilla.suse.com/1049316", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10102", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10102", }, { cve: "CVE-2017-10105", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10105", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10105", url: "https://www.suse.com/security/cve/CVE-2017-10105", }, { category: "external", summary: "SUSE Bug 1049317 for CVE-2017-10105", url: "https://bugzilla.suse.com/1049317", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10105", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10105", }, { cve: "CVE-2017-10107", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10107", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10107", url: "https://www.suse.com/security/cve/CVE-2017-10107", }, { category: "external", summary: "SUSE Bug 1049318 for CVE-2017-10107", url: "https://bugzilla.suse.com/1049318", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10107", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2017-10107", }, { cve: "CVE-2017-10108", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10108", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10108", url: "https://www.suse.com/security/cve/CVE-2017-10108", }, { category: "external", summary: "SUSE Bug 1049319 for CVE-2017-10108", url: "https://bugzilla.suse.com/1049319", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10108", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10108", }, { cve: "CVE-2017-10109", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10109", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10109", url: "https://www.suse.com/security/cve/CVE-2017-10109", }, { category: "external", summary: "SUSE Bug 1049320 for CVE-2017-10109", url: "https://bugzilla.suse.com/1049320", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10109", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10109", }, { cve: "CVE-2017-10110", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10110", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10110", url: "https://www.suse.com/security/cve/CVE-2017-10110", }, { category: "external", summary: "SUSE Bug 1049321 for CVE-2017-10110", url: "https://bugzilla.suse.com/1049321", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10110", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10110", }, { cve: "CVE-2017-10111", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10111", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10111", url: "https://www.suse.com/security/cve/CVE-2017-10111", }, { category: "external", summary: "SUSE Bug 1049322 for CVE-2017-10111", url: "https://bugzilla.suse.com/1049322", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10111", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10111", }, { cve: "CVE-2017-10114", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10114", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10114", url: "https://www.suse.com/security/cve/CVE-2017-10114", }, { category: "external", summary: "SUSE Bug 1049323 for CVE-2017-10114", url: "https://bugzilla.suse.com/1049323", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10114", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10114", }, { cve: "CVE-2017-10115", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10115", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10115", url: "https://www.suse.com/security/cve/CVE-2017-10115", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2017-10115", url: "https://bugzilla.suse.com/1020905", }, { category: "external", summary: "SUSE Bug 1049324 for CVE-2017-10115", url: "https://bugzilla.suse.com/1049324", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10115", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2017-10115", }, { cve: "CVE-2017-10116", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10116", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10116", url: "https://www.suse.com/security/cve/CVE-2017-10116", }, { category: "external", summary: "SUSE Bug 1049325 for CVE-2017-10116", url: "https://bugzilla.suse.com/1049325", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10116", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10116", }, { cve: "CVE-2017-10118", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10118", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10118", url: "https://www.suse.com/security/cve/CVE-2017-10118", }, { category: "external", summary: "SUSE Bug 1049326 for CVE-2017-10118", url: "https://bugzilla.suse.com/1049326", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10118", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10118", }, { cve: "CVE-2017-10125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10125", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows physical access to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to deployment of Java where the Java Auto Update is enabled. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10125", url: "https://www.suse.com/security/cve/CVE-2017-10125", }, { category: "external", summary: "SUSE Bug 1049327 for CVE-2017-10125", url: "https://bugzilla.suse.com/1049327", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10125", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10125", }, { cve: "CVE-2017-10135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10135", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10135", url: "https://www.suse.com/security/cve/CVE-2017-10135", }, { category: "external", summary: "SUSE Bug 1049328 for CVE-2017-10135", url: "https://bugzilla.suse.com/1049328", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10135", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10135", }, { cve: "CVE-2017-10176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10176", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10176", url: "https://www.suse.com/security/cve/CVE-2017-10176", }, { category: "external", summary: "SUSE Bug 1049329 for CVE-2017-10176", url: "https://bugzilla.suse.com/1049329", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10176", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10176", }, { cve: "CVE-2017-10193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10193", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10193", url: "https://www.suse.com/security/cve/CVE-2017-10193", }, { category: "external", summary: "SUSE Bug 1049330 for CVE-2017-10193", url: "https://bugzilla.suse.com/1049330", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10193", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-10193", }, { cve: "CVE-2017-10198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10198", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10198", url: "https://www.suse.com/security/cve/CVE-2017-10198", }, { category: "external", summary: "SUSE Bug 1049331 for CVE-2017-10198", url: "https://bugzilla.suse.com/1049331", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10198", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10198", }, { cve: "CVE-2017-10243", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10243", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10243", url: "https://www.suse.com/security/cve/CVE-2017-10243", }, { category: "external", summary: "SUSE Bug 1049332 for CVE-2017-10243", url: "https://bugzilla.suse.com/1049332", }, { category: "external", summary: "SUSE Bug 1049333 for CVE-2017-10243", url: "https://bugzilla.suse.com/1049333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10243", }, { cve: "CVE-2017-10274", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10274", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Smart Card IO). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10274", url: "https://www.suse.com/security/cve/CVE-2017-10274", }, { category: "external", summary: "SUSE Bug 1064071 for CVE-2017-10274", url: "https://bugzilla.suse.com/1064071", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10274", }, { cve: "CVE-2017-10281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10281", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10281", url: "https://www.suse.com/security/cve/CVE-2017-10281", }, { category: "external", summary: "SUSE Bug 1064072 for CVE-2017-10281", url: "https://bugzilla.suse.com/1064072", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10281", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10281", }, { cve: "CVE-2017-10285", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10285", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10285", url: "https://www.suse.com/security/cve/CVE-2017-10285", }, { category: "external", summary: "SUSE Bug 1064073 for CVE-2017-10285", url: "https://bugzilla.suse.com/1064073", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10285", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2017-10285", }, { cve: "CVE-2017-10295", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10295", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10295", url: "https://www.suse.com/security/cve/CVE-2017-10295", }, { category: "external", summary: "SUSE Bug 1064075 for CVE-2017-10295", url: "https://bugzilla.suse.com/1064075", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10295", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-10295", }, { cve: "CVE-2017-10345", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10345", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10345", url: "https://www.suse.com/security/cve/CVE-2017-10345", }, { category: "external", summary: "SUSE Bug 1064077 for CVE-2017-10345", url: "https://bugzilla.suse.com/1064077", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10345", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-10345", }, { cve: "CVE-2017-10346", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10346", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10346", url: "https://www.suse.com/security/cve/CVE-2017-10346", }, { category: "external", summary: "SUSE Bug 1064078 for CVE-2017-10346", url: "https://bugzilla.suse.com/1064078", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10346", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2017-10346", }, { cve: "CVE-2017-10347", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10347", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10347", url: "https://www.suse.com/security/cve/CVE-2017-10347", }, { category: "external", summary: "SUSE Bug 1064079 for CVE-2017-10347", url: "https://bugzilla.suse.com/1064079", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10347", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10347", }, { cve: "CVE-2017-10348", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10348", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10348", url: "https://www.suse.com/security/cve/CVE-2017-10348", }, { category: "external", summary: "SUSE Bug 1064080 for CVE-2017-10348", url: "https://bugzilla.suse.com/1064080", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10348", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10348", }, { cve: "CVE-2017-10349", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10349", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10349", url: "https://www.suse.com/security/cve/CVE-2017-10349", }, { category: "external", summary: "SUSE Bug 1064081 for CVE-2017-10349", url: "https://bugzilla.suse.com/1064081", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10349", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10349", }, { cve: "CVE-2017-10350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10350", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10350", url: "https://www.suse.com/security/cve/CVE-2017-10350", }, { category: "external", summary: "SUSE Bug 1064082 for CVE-2017-10350", url: "https://bugzilla.suse.com/1064082", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10350", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10350", }, { cve: "CVE-2017-10355", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10355", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10355", url: "https://www.suse.com/security/cve/CVE-2017-10355", }, { category: "external", summary: "SUSE Bug 1064083 for CVE-2017-10355", url: "https://bugzilla.suse.com/1064083", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10355", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10355", }, { cve: "CVE-2017-10356", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10356", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10356", url: "https://www.suse.com/security/cve/CVE-2017-10356", }, { category: "external", summary: "SUSE Bug 1064084 for CVE-2017-10356", url: "https://bugzilla.suse.com/1064084", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10356", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10356", }, { cve: "CVE-2017-10357", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10357", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10357", url: "https://www.suse.com/security/cve/CVE-2017-10357", }, { category: "external", summary: "SUSE Bug 1064085 for CVE-2017-10357", url: "https://bugzilla.suse.com/1064085", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10357", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-10357", }, { cve: "CVE-2017-10388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10388", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: Applies to the Java SE Kerberos client. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10388", url: "https://www.suse.com/security/cve/CVE-2017-10388", }, { category: "external", summary: "SUSE Bug 1064086 for CVE-2017-10388", url: "https://bugzilla.suse.com/1064086", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2017-10388", url: "https://bugzilla.suse.com/1070162", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-10388", }, { cve: "CVE-2017-3231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3231", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3231", url: "https://www.suse.com/security/cve/CVE-2017-3231", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2017-3231", url: "https://bugzilla.suse.com/1020905", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2017-3231", url: "https://bugzilla.suse.com/1024218", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-3231", }, { cve: "CVE-2017-3241", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3241", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3241", url: "https://www.suse.com/security/cve/CVE-2017-3241", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2017-3241", url: "https://bugzilla.suse.com/1020905", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2017-3241", url: "https://bugzilla.suse.com/1024218", }, { category: "external", summary: "SUSE Bug 1163365 for CVE-2017-3241", url: "https://bugzilla.suse.com/1163365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-3241", }, { cve: "CVE-2017-3252", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3252", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAAS). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.8 (Integrity impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3252", url: "https://www.suse.com/security/cve/CVE-2017-3252", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2017-3252", url: "https://bugzilla.suse.com/1020905", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2017-3252", url: "https://bugzilla.suse.com/1024218", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-3252", }, { cve: "CVE-2017-3253", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3253", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Availability impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3253", url: "https://www.suse.com/security/cve/CVE-2017-3253", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2017-3253", url: "https://bugzilla.suse.com/1020905", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2017-3253", url: "https://bugzilla.suse.com/1024218", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-3253", }, { cve: "CVE-2017-3260", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3260", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u121 and 8u112. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3260", url: "https://www.suse.com/security/cve/CVE-2017-3260", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2017-3260", url: "https://bugzilla.suse.com/1020905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2017-3260", }, { cve: "CVE-2017-3261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3261", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3261", url: "https://www.suse.com/security/cve/CVE-2017-3261", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2017-3261", url: "https://bugzilla.suse.com/1020905", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2017-3261", url: "https://bugzilla.suse.com/1024218", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-3261", }, { cve: "CVE-2017-3272", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3272", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3272", url: "https://www.suse.com/security/cve/CVE-2017-3272", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2017-3272", url: "https://bugzilla.suse.com/1020905", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2017-3272", url: "https://bugzilla.suse.com/1024218", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-3272", }, { cve: "CVE-2017-3289", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3289", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3289", url: "https://www.suse.com/security/cve/CVE-2017-3289", }, { category: "external", summary: "SUSE Bug 1020905 for CVE-2017-3289", url: "https://bugzilla.suse.com/1020905", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2017-3289", url: "https://bugzilla.suse.com/1024218", }, { category: "external", summary: "SUSE Bug 1163365 for CVE-2017-3289", url: "https://bugzilla.suse.com/1163365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2017-3289", }, { cve: "CVE-2017-3509", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3509", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3509", url: "https://www.suse.com/security/cve/CVE-2017-3509", }, { category: "external", summary: "SUSE Bug 1034849 for CVE-2017-3509", url: "https://bugzilla.suse.com/1034849", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2017-3509", url: "https://bugzilla.suse.com/1038505", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-3509", }, { cve: "CVE-2017-3511", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3511", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3511", url: "https://www.suse.com/security/cve/CVE-2017-3511", }, { category: "external", summary: "SUSE Bug 1034849 for CVE-2017-3511", url: "https://bugzilla.suse.com/1034849", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2017-3511", url: "https://bugzilla.suse.com/1038505", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-3511", }, { cve: "CVE-2017-3512", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3512", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3512", url: "https://www.suse.com/security/cve/CVE-2017-3512", }, { category: "external", summary: "SUSE Bug 1034849 for CVE-2017-3512", url: "https://bugzilla.suse.com/1034849", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2017-3512", url: "https://bugzilla.suse.com/1038505", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-3512", }, { cve: "CVE-2017-3514", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3514", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3514", url: "https://www.suse.com/security/cve/CVE-2017-3514", }, { category: "external", summary: "SUSE Bug 1034849 for CVE-2017-3514", url: "https://bugzilla.suse.com/1034849", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2017-3514", url: "https://bugzilla.suse.com/1038505", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-3514", }, { cve: "CVE-2017-3526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3526", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3526", url: "https://www.suse.com/security/cve/CVE-2017-3526", }, { category: "external", summary: "SUSE Bug 1034849 for CVE-2017-3526", url: "https://bugzilla.suse.com/1034849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-3526", }, { cve: "CVE-2017-3533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3533", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3533", url: "https://www.suse.com/security/cve/CVE-2017-3533", }, { category: "external", summary: "SUSE Bug 1034849 for CVE-2017-3533", url: "https://bugzilla.suse.com/1034849", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2017-3533", url: "https://bugzilla.suse.com/1038505", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-3533", }, { cve: "CVE-2017-3539", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3539", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3539", url: "https://www.suse.com/security/cve/CVE-2017-3539", }, { category: "external", summary: "SUSE Bug 1005522 for CVE-2017-3539", url: "https://bugzilla.suse.com/1005522", }, { category: "external", summary: "SUSE Bug 1034849 for CVE-2017-3539", url: "https://bugzilla.suse.com/1034849", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2017-3539", url: "https://bugzilla.suse.com/1038505", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-3539", }, { cve: "CVE-2017-3544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3544", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3544", url: "https://www.suse.com/security/cve/CVE-2017-3544", }, { category: "external", summary: "SUSE Bug 1034849 for CVE-2017-3544", url: "https://bugzilla.suse.com/1034849", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2017-3544", url: "https://bugzilla.suse.com/1038505", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-3544", }, { cve: "CVE-2018-11212", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-11212", }, ], notes: [ { category: "general", text: "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-11212", url: "https://www.suse.com/security/cve/CVE-2018-11212", }, { category: "external", summary: "SUSE Bug 1122299 for CVE-2018-11212", url: "https://bugzilla.suse.com/1122299", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-11212", }, { cve: "CVE-2018-13785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13785", }, ], notes: [ { category: "general", text: "In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13785", url: "https://www.suse.com/security/cve/CVE-2018-13785", }, { category: "external", summary: "SUSE Bug 1100687 for CVE-2018-13785", url: "https://bugzilla.suse.com/1100687", }, { category: "external", summary: "SUSE Bug 1112153 for CVE-2018-13785", url: "https://bugzilla.suse.com/1112153", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-13785", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-13785", }, { cve: "CVE-2018-16435", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16435", }, ], notes: [ { category: "general", text: "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16435", url: "https://www.suse.com/security/cve/CVE-2018-16435", }, { category: "external", summary: "SUSE Bug 1108813 for CVE-2018-16435", url: "https://bugzilla.suse.com/1108813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-16435", }, { cve: "CVE-2018-2579", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2579", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2579", url: "https://www.suse.com/security/cve/CVE-2018-2579", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2579", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2579", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-2579", }, { cve: "CVE-2018-2582", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2582", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2582", url: "https://www.suse.com/security/cve/CVE-2018-2582", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2582", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2582", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2582", }, { cve: "CVE-2018-2588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2588", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: LDAP). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2588", url: "https://www.suse.com/security/cve/CVE-2018-2588", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2588", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2588", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2588", }, { cve: "CVE-2018-2599", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2599", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2599", url: "https://www.suse.com/security/cve/CVE-2018-2599", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2599", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2599", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2599", }, { cve: "CVE-2018-2602", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2602", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2602", url: "https://www.suse.com/security/cve/CVE-2018-2602", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2602", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2602", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2602", }, { cve: "CVE-2018-2603", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2603", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2603", url: "https://www.suse.com/security/cve/CVE-2018-2603", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2603", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2603", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2603", }, { cve: "CVE-2018-2618", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2618", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2618", url: "https://www.suse.com/security/cve/CVE-2018-2618", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2618", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2618", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2618", }, { cve: "CVE-2018-2629", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2629", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2629", url: "https://www.suse.com/security/cve/CVE-2018-2629", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2629", url: "https://bugzilla.suse.com/1076366", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2629", }, { cve: "CVE-2018-2633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2633", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2633", url: "https://www.suse.com/security/cve/CVE-2018-2633", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2633", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2633", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2633", }, { cve: "CVE-2018-2634", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2634", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2634", url: "https://www.suse.com/security/cve/CVE-2018-2634", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2634", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2634", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2634", }, { cve: "CVE-2018-2637", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2637", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2637", url: "https://www.suse.com/security/cve/CVE-2018-2637", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2637", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2637", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2637", }, { cve: "CVE-2018-2641", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2641", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2641", url: "https://www.suse.com/security/cve/CVE-2018-2641", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2641", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2641", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2641", }, { cve: "CVE-2018-2663", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2663", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2663", url: "https://www.suse.com/security/cve/CVE-2018-2663", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2663", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2663", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2663", }, { cve: "CVE-2018-2677", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2677", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2677", url: "https://www.suse.com/security/cve/CVE-2018-2677", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2677", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2677", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2677", }, { cve: "CVE-2018-2678", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2678", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2678", url: "https://www.suse.com/security/cve/CVE-2018-2678", }, { category: "external", summary: "SUSE Bug 1076366 for CVE-2018-2678", url: "https://bugzilla.suse.com/1076366", }, { category: "external", summary: "SUSE Bug 1082810 for CVE-2018-2678", url: "https://bugzilla.suse.com/1082810", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2678", }, { cve: "CVE-2018-2790", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2790", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2790", url: "https://www.suse.com/security/cve/CVE-2018-2790", }, { category: "external", summary: "SUSE Bug 1090023 for CVE-2018-2790", url: "https://bugzilla.suse.com/1090023", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2790", url: "https://bugzilla.suse.com/1093311", }, { category: "external", summary: "SUSE Bug 1101637 for CVE-2018-2790", url: "https://bugzilla.suse.com/1101637", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-2790", }, { cve: "CVE-2018-2794", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2794", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2794", url: "https://www.suse.com/security/cve/CVE-2018-2794", }, { category: "external", summary: "SUSE Bug 1090024 for CVE-2018-2794", url: "https://bugzilla.suse.com/1090024", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2794", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2794", }, { cve: "CVE-2018-2795", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2795", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2795", url: "https://www.suse.com/security/cve/CVE-2018-2795", }, { category: "external", summary: "SUSE Bug 1090025 for CVE-2018-2795", url: "https://bugzilla.suse.com/1090025", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2795", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2795", }, { cve: "CVE-2018-2796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2796", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2796", url: "https://www.suse.com/security/cve/CVE-2018-2796", }, { category: "external", summary: "SUSE Bug 1090026 for CVE-2018-2796", url: "https://bugzilla.suse.com/1090026", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2796", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2796", }, { cve: "CVE-2018-2797", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2797", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2797", url: "https://www.suse.com/security/cve/CVE-2018-2797", }, { category: "external", summary: "SUSE Bug 1090027 for CVE-2018-2797", url: "https://bugzilla.suse.com/1090027", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2797", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2797", }, { cve: "CVE-2018-2798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2798", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2798", url: "https://www.suse.com/security/cve/CVE-2018-2798", }, { category: "external", summary: "SUSE Bug 1090028 for CVE-2018-2798", url: "https://bugzilla.suse.com/1090028", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2798", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2798", }, { cve: "CVE-2018-2799", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2799", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2799", url: "https://www.suse.com/security/cve/CVE-2018-2799", }, { category: "external", summary: "SUSE Bug 1090029 for CVE-2018-2799", url: "https://bugzilla.suse.com/1090029", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2799", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2799", }, { cve: "CVE-2018-2800", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2800", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, JRockit accessible data as well as unauthorized read access to a subset of Java SE, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2800", url: "https://www.suse.com/security/cve/CVE-2018-2800", }, { category: "external", summary: "SUSE Bug 1090030 for CVE-2018-2800", url: "https://bugzilla.suse.com/1090030", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2800", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2800", }, { cve: "CVE-2018-2814", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2814", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2814", url: "https://www.suse.com/security/cve/CVE-2018-2814", }, { category: "external", summary: "SUSE Bug 1090032 for CVE-2018-2814", url: "https://bugzilla.suse.com/1090032", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2814", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2814", }, { cve: "CVE-2018-2815", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2815", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2815", url: "https://www.suse.com/security/cve/CVE-2018-2815", }, { category: "external", summary: "SUSE Bug 1090033 for CVE-2018-2815", url: "https://bugzilla.suse.com/1090033", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2815", }, { cve: "CVE-2018-2938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2938", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2938", url: "https://www.suse.com/security/cve/CVE-2018-2938", }, { category: "external", summary: "SUSE Bug 1101644 for CVE-2018-2938", url: "https://bugzilla.suse.com/1101644", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2938", }, { cve: "CVE-2018-2940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2940", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2940", url: "https://www.suse.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2940", }, { cve: "CVE-2018-2952", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2952", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2952", url: "https://www.suse.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101651 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101651", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2952", }, { cve: "CVE-2018-2973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2973", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2973", url: "https://www.suse.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2973", }, { cve: "CVE-2018-3136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3136", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3136", url: "https://www.suse.com/security/cve/CVE-2018-3136", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3136", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3136", }, { cve: "CVE-2018-3139", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3139", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3139", url: "https://www.suse.com/security/cve/CVE-2018-3139", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3139", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3139", }, { cve: "CVE-2018-3149", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3149", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3149", url: "https://www.suse.com/security/cve/CVE-2018-3149", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3149", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-3149", }, { cve: "CVE-2018-3169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3169", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3169", url: "https://www.suse.com/security/cve/CVE-2018-3169", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3169", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-3169", }, { cve: "CVE-2018-3180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3180", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3180", url: "https://www.suse.com/security/cve/CVE-2018-3180", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112147 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112147", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3180", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-3180", }, { cve: "CVE-2018-3183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3183", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3183", url: "https://www.suse.com/security/cve/CVE-2018-3183", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3183", url: "https://bugzilla.suse.com/1116574", }, { category: "external", summary: "SUSE Bug 1120714 for CVE-2018-3183", url: "https://bugzilla.suse.com/1120714", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-3183", }, { cve: "CVE-2018-3214", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3214", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3214", url: "https://www.suse.com/security/cve/CVE-2018-3214", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3214", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3214", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3214", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3214", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3214", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3214", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3214", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-3214", }, { cve: "CVE-2018-3639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3639", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3639", url: "https://www.suse.com/security/cve/CVE-2018-3639", }, { category: "external", summary: "SUSE Bug 1074701 for CVE-2018-3639", url: "https://bugzilla.suse.com/1074701", }, { category: "external", summary: "SUSE Bug 1085235 for CVE-2018-3639", url: "https://bugzilla.suse.com/1085235", }, { category: "external", summary: "SUSE Bug 1085308 for CVE-2018-3639", url: "https://bugzilla.suse.com/1085308", }, { category: "external", summary: "SUSE Bug 1087078 for CVE-2018-3639", url: "https://bugzilla.suse.com/1087078", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-3639", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092631 for CVE-2018-3639", url: "https://bugzilla.suse.com/1092631", }, { category: "external", summary: "SUSE Bug 1092885 for CVE-2018-3639", url: "https://bugzilla.suse.com/1092885", }, { category: "external", summary: "SUSE Bug 1094912 for CVE-2018-3639", url: "https://bugzilla.suse.com/1094912", }, { category: "external", summary: "SUSE Bug 1098813 for CVE-2018-3639", url: "https://bugzilla.suse.com/1098813", }, { category: "external", summary: "SUSE Bug 1100394 for CVE-2018-3639", url: "https://bugzilla.suse.com/1100394", }, { category: "external", summary: "SUSE Bug 1102640 for CVE-2018-3639", url: "https://bugzilla.suse.com/1102640", }, { category: "external", summary: "SUSE Bug 1105412 for CVE-2018-3639", url: "https://bugzilla.suse.com/1105412", }, { category: "external", summary: "SUSE Bug 1111963 for CVE-2018-3639", url: "https://bugzilla.suse.com/1111963", }, { category: "external", summary: "SUSE Bug 1172781 for CVE-2018-3639", url: "https://bugzilla.suse.com/1172781", }, { category: "external", summary: "SUSE Bug 1172782 for CVE-2018-3639", url: "https://bugzilla.suse.com/1172782", }, { category: "external", summary: "SUSE Bug 1172783 for CVE-2018-3639", url: "https://bugzilla.suse.com/1172783", }, { category: "external", summary: "SUSE Bug 1173489 for CVE-2018-3639", url: "https://bugzilla.suse.com/1173489", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2018-3639", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-3639", url: "https://bugzilla.suse.com/1201877", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2018-3639", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-3639", }, { cve: "CVE-2019-2422", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2422", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2422", url: "https://www.suse.com/security/cve/CVE-2019-2422", }, { category: "external", summary: "SUSE Bug 1122293 for CVE-2019-2422", url: "https://bugzilla.suse.com/1122293", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2422", }, { cve: "CVE-2019-2426", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2426", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2426", url: "https://www.suse.com/security/cve/CVE-2019-2426", }, { category: "external", summary: "SUSE Bug 1134297 for CVE-2019-2426", url: "https://bugzilla.suse.com/1134297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2426", }, { cve: "CVE-2019-2602", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2602", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2602", url: "https://www.suse.com/security/cve/CVE-2019-2602", }, { category: "external", summary: "SUSE Bug 1132728 for CVE-2019-2602", url: "https://bugzilla.suse.com/1132728", }, { category: "external", summary: "SUSE Bug 1134718 for CVE-2019-2602", url: "https://bugzilla.suse.com/1134718", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2602", }, { cve: "CVE-2019-2684", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2684", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2684", url: "https://www.suse.com/security/cve/CVE-2019-2684", }, { category: "external", summary: "SUSE Bug 1132732 for CVE-2019-2684", url: "https://bugzilla.suse.com/1132732", }, { category: "external", summary: "SUSE Bug 1134718 for CVE-2019-2684", url: "https://bugzilla.suse.com/1134718", }, { category: "external", summary: "SUSE Bug 1184734 for CVE-2019-2684", url: "https://bugzilla.suse.com/1184734", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2684", }, { cve: "CVE-2019-2698", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2698", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2698", url: "https://www.suse.com/security/cve/CVE-2019-2698", }, { category: "external", summary: "SUSE Bug 1132729 for CVE-2019-2698", url: "https://bugzilla.suse.com/1132729", }, { category: "external", summary: "SUSE Bug 1134718 for CVE-2019-2698", url: "https://bugzilla.suse.com/1134718", }, { category: "external", summary: "SUSE Bug 1163365 for CVE-2019-2698", url: "https://bugzilla.suse.com/1163365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2698", }, { cve: "CVE-2019-2745", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2745", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2745", url: "https://www.suse.com/security/cve/CVE-2019-2745", }, { category: "external", summary: "SUSE Bug 1141784 for CVE-2019-2745", url: "https://bugzilla.suse.com/1141784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2745", }, { cve: "CVE-2019-2762", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2762", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2762", url: "https://www.suse.com/security/cve/CVE-2019-2762", }, { category: "external", summary: "SUSE Bug 1141782 for CVE-2019-2762", url: "https://bugzilla.suse.com/1141782", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2762", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2762", }, { cve: "CVE-2019-2766", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2766", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2766", url: "https://www.suse.com/security/cve/CVE-2019-2766", }, { category: "external", summary: "SUSE Bug 1141789 for CVE-2019-2766", url: "https://bugzilla.suse.com/1141789", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2766", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2766", }, { cve: "CVE-2019-2769", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2769", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2769", url: "https://www.suse.com/security/cve/CVE-2019-2769", }, { category: "external", summary: "SUSE Bug 1141783 for CVE-2019-2769", url: "https://bugzilla.suse.com/1141783", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2769", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2769", }, { cve: "CVE-2019-2786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2786", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2786", url: "https://www.suse.com/security/cve/CVE-2019-2786", }, { category: "external", summary: "SUSE Bug 1141787 for CVE-2019-2786", url: "https://bugzilla.suse.com/1141787", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2786", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2786", }, { cve: "CVE-2019-2816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2816", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2816", url: "https://www.suse.com/security/cve/CVE-2019-2816", }, { category: "external", summary: "SUSE Bug 1141785 for CVE-2019-2816", url: "https://bugzilla.suse.com/1141785", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-2816", url: "https://bugzilla.suse.com/1147021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2816", }, { cve: "CVE-2019-2842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2842", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2842", url: "https://www.suse.com/security/cve/CVE-2019-2842", }, { category: "external", summary: "SUSE Bug 1141786 for CVE-2019-2842", url: "https://bugzilla.suse.com/1141786", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2842", }, { cve: "CVE-2019-2894", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2894", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2894", url: "https://www.suse.com/security/cve/CVE-2019-2894", }, { category: "external", summary: "SUSE Bug 1152856 for CVE-2019-2894", url: "https://bugzilla.suse.com/1152856", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2894", url: "https://bugzilla.suse.com/1154212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2894", }, { cve: "CVE-2019-2933", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2933", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2933", url: "https://www.suse.com/security/cve/CVE-2019-2933", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2933", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2933", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2933", }, { cve: "CVE-2019-2945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2945", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2945", url: "https://www.suse.com/security/cve/CVE-2019-2945", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2945", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2945", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2945", }, { cve: "CVE-2019-2949", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2949", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2949", url: "https://www.suse.com/security/cve/CVE-2019-2949", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2949", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2019-2949", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2949", }, { cve: "CVE-2019-2958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2958", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2958", url: "https://www.suse.com/security/cve/CVE-2019-2958", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2958", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2958", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2958", }, { cve: "CVE-2019-2962", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2962", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2962", url: "https://www.suse.com/security/cve/CVE-2019-2962", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2962", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2962", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2962", }, { cve: "CVE-2019-2964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2964", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2964", url: "https://www.suse.com/security/cve/CVE-2019-2964", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2964", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2964", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2964", }, { cve: "CVE-2019-2973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2973", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2973", url: "https://www.suse.com/security/cve/CVE-2019-2973", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2973", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2973", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2973", }, { cve: "CVE-2019-2975", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2975", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2975", url: "https://www.suse.com/security/cve/CVE-2019-2975", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2975", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2975", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2975", }, { cve: "CVE-2019-2978", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2978", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2978", url: "https://www.suse.com/security/cve/CVE-2019-2978", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2978", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2978", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2978", }, { cve: "CVE-2019-2981", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2981", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2981", url: "https://www.suse.com/security/cve/CVE-2019-2981", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2981", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2981", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2981", }, { cve: "CVE-2019-2983", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2983", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2983", url: "https://www.suse.com/security/cve/CVE-2019-2983", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2983", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2983", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2983", }, { cve: "CVE-2019-2987", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2987", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2987", url: "https://www.suse.com/security/cve/CVE-2019-2987", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2987", url: "https://bugzilla.suse.com/1154212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2987", }, { cve: "CVE-2019-2988", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2988", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2988", url: "https://www.suse.com/security/cve/CVE-2019-2988", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2988", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2988", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2988", }, { cve: "CVE-2019-2989", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2989", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2989", url: "https://www.suse.com/security/cve/CVE-2019-2989", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2989", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2989", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2989", }, { cve: "CVE-2019-2992", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2992", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2992", url: "https://www.suse.com/security/cve/CVE-2019-2992", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2992", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2992", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2992", }, { cve: "CVE-2019-2999", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2999", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2999", url: "https://www.suse.com/security/cve/CVE-2019-2999", }, { category: "external", summary: "SUSE Bug 1154212 for CVE-2019-2999", url: "https://bugzilla.suse.com/1154212", }, { category: "external", summary: "SUSE Bug 1158442 for CVE-2019-2999", url: "https://bugzilla.suse.com/1158442", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2999", }, { cve: "CVE-2019-7317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-7317", }, ], notes: [ { category: "general", text: "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-7317", url: "https://www.suse.com/security/cve/CVE-2019-7317", }, { category: "external", summary: "SUSE Bug 1124211 for CVE-2019-7317", url: "https://bugzilla.suse.com/1124211", }, { category: "external", summary: "SUSE Bug 1135824 for CVE-2019-7317", url: "https://bugzilla.suse.com/1135824", }, { category: "external", summary: "SUSE Bug 1141780 for CVE-2019-7317", url: "https://bugzilla.suse.com/1141780", }, { category: "external", summary: "SUSE Bug 1147021 for CVE-2019-7317", url: "https://bugzilla.suse.com/1147021", }, { category: "external", summary: "SUSE Bug 1165297 for CVE-2019-7317", url: "https://bugzilla.suse.com/1165297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-7317", }, { cve: "CVE-2020-14556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14556", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14556", url: "https://www.suse.com/security/cve/CVE-2020-14556", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14556", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14556", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14556", }, { cve: "CVE-2020-14577", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14577", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14577", url: "https://www.suse.com/security/cve/CVE-2020-14577", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14577", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14577", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14577", }, { cve: "CVE-2020-14578", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14578", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14578", url: "https://www.suse.com/security/cve/CVE-2020-14578", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14578", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14578", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14578", }, { cve: "CVE-2020-14579", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14579", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14579", url: "https://www.suse.com/security/cve/CVE-2020-14579", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14579", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14579", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14579", }, { cve: "CVE-2020-14581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14581", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14581", url: "https://www.suse.com/security/cve/CVE-2020-14581", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14581", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14581", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14581", }, { cve: "CVE-2020-14583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14583", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14583", url: "https://www.suse.com/security/cve/CVE-2020-14583", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14583", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14583", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14583", }, { cve: "CVE-2020-14593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14593", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14593", url: "https://www.suse.com/security/cve/CVE-2020-14593", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14593", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14593", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14593", }, { cve: "CVE-2020-14621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14621", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14621", url: "https://www.suse.com/security/cve/CVE-2020-14621", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14621", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14621", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14621", }, { cve: "CVE-2020-14779", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14779", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14779", url: "https://www.suse.com/security/cve/CVE-2020-14779", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14779", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14779", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14779", }, { cve: "CVE-2020-14781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14781", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14781", url: "https://www.suse.com/security/cve/CVE-2020-14781", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14781", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14781", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14781", }, { cve: "CVE-2020-14782", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14782", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14782", url: "https://www.suse.com/security/cve/CVE-2020-14782", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14782", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14782", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14782", }, { cve: "CVE-2020-14792", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14792", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14792", url: "https://www.suse.com/security/cve/CVE-2020-14792", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14792", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14792", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14792", }, { cve: "CVE-2020-14796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14796", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14796", url: "https://www.suse.com/security/cve/CVE-2020-14796", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14796", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14796", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14796", }, { cve: "CVE-2020-14797", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14797", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14797", url: "https://www.suse.com/security/cve/CVE-2020-14797", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14797", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14797", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14797", }, { cve: "CVE-2020-14798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14798", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14798", url: "https://www.suse.com/security/cve/CVE-2020-14798", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14798", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14798", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14798", }, { cve: "CVE-2020-14803", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14803", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14803", url: "https://www.suse.com/security/cve/CVE-2020-14803", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14803", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1181239 for CVE-2020-14803", url: "https://bugzilla.suse.com/1181239", }, { category: "external", summary: "SUSE Bug 1182186 for CVE-2020-14803", url: "https://bugzilla.suse.com/1182186", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14803", }, { cve: "CVE-2020-2583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2583", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2583", url: "https://www.suse.com/security/cve/CVE-2020-2583", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2583", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1162972 for CVE-2020-2583", url: "https://bugzilla.suse.com/1162972", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2583", }, { cve: "CVE-2020-2590", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2590", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2590", url: "https://www.suse.com/security/cve/CVE-2020-2590", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2590", url: "https://bugzilla.suse.com/1160968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2590", }, { cve: "CVE-2020-2593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2593", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2593", url: "https://www.suse.com/security/cve/CVE-2020-2593", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2593", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1162972 for CVE-2020-2593", url: "https://bugzilla.suse.com/1162972", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2593", }, { cve: "CVE-2020-2601", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2601", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2601", url: "https://www.suse.com/security/cve/CVE-2020-2601", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2601", url: "https://bugzilla.suse.com/1160968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2601", }, { cve: "CVE-2020-2604", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2604", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2604", url: "https://www.suse.com/security/cve/CVE-2020-2604", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2604", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1162972 for CVE-2020-2604", url: "https://bugzilla.suse.com/1162972", }, { category: "external", summary: "SUSE Bug 1165863 for CVE-2020-2604", url: "https://bugzilla.suse.com/1165863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2604", }, { cve: "CVE-2020-2654", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2654", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2654", url: "https://www.suse.com/security/cve/CVE-2020-2654", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2654", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2654", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-2654", }, { cve: "CVE-2020-2659", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2659", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241 and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2659", url: "https://www.suse.com/security/cve/CVE-2020-2659", }, { category: "external", summary: "SUSE Bug 1160968 for CVE-2020-2659", url: "https://bugzilla.suse.com/1160968", }, { category: "external", summary: "SUSE Bug 1162972 for CVE-2020-2659", url: "https://bugzilla.suse.com/1162972", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2020-2659", }, { cve: "CVE-2020-2754", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2754", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2754", url: "https://www.suse.com/security/cve/CVE-2020-2754", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2754", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2754", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2754", }, { cve: "CVE-2020-2755", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2755", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2755", url: "https://www.suse.com/security/cve/CVE-2020-2755", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2755", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2755", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2755", }, { cve: "CVE-2020-2756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2756", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2756", url: "https://www.suse.com/security/cve/CVE-2020-2756", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2756", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2756", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2756", }, { cve: "CVE-2020-2757", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2757", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2757", url: "https://www.suse.com/security/cve/CVE-2020-2757", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2757", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2757", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2757", }, { cve: "CVE-2020-2773", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2773", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2773", url: "https://www.suse.com/security/cve/CVE-2020-2773", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2773", url: "https://bugzilla.suse.com/1169511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2773", }, { cve: "CVE-2020-2781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2781", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2781", url: "https://www.suse.com/security/cve/CVE-2020-2781", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2781", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2781", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2781", }, { cve: "CVE-2020-2800", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2800", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2800", url: "https://www.suse.com/security/cve/CVE-2020-2800", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2800", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2800", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2800", }, { cve: "CVE-2020-2803", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2803", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2803", url: "https://www.suse.com/security/cve/CVE-2020-2803", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2803", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2803", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2803", }, { cve: "CVE-2020-2805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2805", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2805", url: "https://www.suse.com/security/cve/CVE-2020-2805", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2805", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2805", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2805", }, { cve: "CVE-2020-2830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2830", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2830", url: "https://www.suse.com/security/cve/CVE-2020-2830", }, { category: "external", summary: "SUSE Bug 1169511 for CVE-2020-2830", url: "https://bugzilla.suse.com/1169511", }, { category: "external", summary: "SUSE Bug 1172277 for CVE-2020-2830", url: "https://bugzilla.suse.com/1172277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-2830", }, { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2163", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2163", url: "https://www.suse.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "SUSE Bug 1185055 for CVE-2021-2163", url: "https://bugzilla.suse.com/1185055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2163", }, { cve: "CVE-2021-2341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2341", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2341", url: "https://www.suse.com/security/cve/CVE-2021-2341", }, { category: "external", summary: "SUSE Bug 1188564 for CVE-2021-2341", url: "https://bugzilla.suse.com/1188564", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-2341", }, { cve: "CVE-2021-2369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2369", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2369", url: "https://www.suse.com/security/cve/CVE-2021-2369", }, { category: "external", summary: "SUSE Bug 1188565 for CVE-2021-2369", url: "https://bugzilla.suse.com/1188565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2369", }, { cve: "CVE-2021-2388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2388", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2388", url: "https://www.suse.com/security/cve/CVE-2021-2388", }, { category: "external", summary: "SUSE Bug 1188566 for CVE-2021-2388", url: "https://bugzilla.suse.com/1188566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-2388", }, ], }
opensuse-su-2024:10873-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "java-15-openjdk-15.0.4.0-2.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the java-15-openjdk-15.0.4.0-2.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10873", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10873-1.json", }, { category: "self", summary: "SUSE CVE CVE-2018-11212 page", url: "https://www.suse.com/security/cve/CVE-2018-11212/", }, { category: "self", summary: "SUSE CVE CVE-2018-2790 page", url: "https://www.suse.com/security/cve/CVE-2018-2790/", }, { category: "self", summary: "SUSE CVE CVE-2018-2794 page", url: "https://www.suse.com/security/cve/CVE-2018-2794/", }, { category: "self", summary: "SUSE CVE CVE-2018-2795 page", url: "https://www.suse.com/security/cve/CVE-2018-2795/", }, { category: "self", summary: "SUSE CVE CVE-2018-2796 page", url: "https://www.suse.com/security/cve/CVE-2018-2796/", }, { category: "self", summary: "SUSE CVE CVE-2018-2797 page", url: "https://www.suse.com/security/cve/CVE-2018-2797/", }, { category: "self", summary: "SUSE CVE CVE-2018-2798 page", url: "https://www.suse.com/security/cve/CVE-2018-2798/", }, { category: "self", summary: "SUSE CVE CVE-2018-2799 page", url: "https://www.suse.com/security/cve/CVE-2018-2799/", }, { category: "self", summary: "SUSE CVE CVE-2018-2814 page", url: "https://www.suse.com/security/cve/CVE-2018-2814/", }, { category: "self", summary: "SUSE CVE CVE-2018-2825 page", url: "https://www.suse.com/security/cve/CVE-2018-2825/", }, { category: "self", summary: "SUSE CVE CVE-2018-2826 page", url: "https://www.suse.com/security/cve/CVE-2018-2826/", }, { category: "self", summary: "SUSE CVE CVE-2018-2940 page", url: "https://www.suse.com/security/cve/CVE-2018-2940/", }, { category: "self", summary: "SUSE CVE CVE-2018-2952 page", url: "https://www.suse.com/security/cve/CVE-2018-2952/", }, { category: "self", summary: "SUSE CVE CVE-2018-2972 page", url: "https://www.suse.com/security/cve/CVE-2018-2972/", }, { category: "self", summary: "SUSE CVE CVE-2018-2973 page", url: "https://www.suse.com/security/cve/CVE-2018-2973/", }, { category: "self", summary: "SUSE CVE CVE-2018-3136 page", url: "https://www.suse.com/security/cve/CVE-2018-3136/", }, { category: "self", summary: "SUSE CVE CVE-2018-3139 page", url: "https://www.suse.com/security/cve/CVE-2018-3139/", }, { category: "self", summary: "SUSE CVE CVE-2018-3149 page", url: "https://www.suse.com/security/cve/CVE-2018-3149/", }, { category: "self", summary: "SUSE CVE CVE-2018-3150 page", url: "https://www.suse.com/security/cve/CVE-2018-3150/", }, { category: "self", summary: "SUSE CVE CVE-2018-3157 page", url: "https://www.suse.com/security/cve/CVE-2018-3157/", }, { category: "self", summary: "SUSE CVE CVE-2018-3169 page", url: "https://www.suse.com/security/cve/CVE-2018-3169/", }, { category: "self", summary: "SUSE CVE CVE-2018-3180 page", url: "https://www.suse.com/security/cve/CVE-2018-3180/", }, { category: "self", summary: "SUSE CVE CVE-2018-3183 page", url: "https://www.suse.com/security/cve/CVE-2018-3183/", }, { category: "self", summary: "SUSE CVE CVE-2019-2422 page", url: "https://www.suse.com/security/cve/CVE-2019-2422/", }, { category: "self", summary: "SUSE CVE CVE-2019-2426 page", url: "https://www.suse.com/security/cve/CVE-2019-2426/", }, { category: "self", summary: "SUSE CVE CVE-2019-2602 page", url: "https://www.suse.com/security/cve/CVE-2019-2602/", }, { category: "self", summary: "SUSE CVE CVE-2019-2684 page", url: "https://www.suse.com/security/cve/CVE-2019-2684/", }, { category: "self", summary: "SUSE CVE CVE-2020-14556 page", url: "https://www.suse.com/security/cve/CVE-2020-14556/", }, { category: "self", summary: "SUSE CVE CVE-2020-14562 page", url: "https://www.suse.com/security/cve/CVE-2020-14562/", }, { category: "self", summary: "SUSE CVE CVE-2020-14573 page", url: "https://www.suse.com/security/cve/CVE-2020-14573/", }, { category: "self", summary: "SUSE CVE CVE-2020-14577 page", url: "https://www.suse.com/security/cve/CVE-2020-14577/", }, { category: "self", summary: "SUSE CVE CVE-2020-14581 page", url: "https://www.suse.com/security/cve/CVE-2020-14581/", }, { category: "self", summary: "SUSE CVE CVE-2020-14583 page", url: "https://www.suse.com/security/cve/CVE-2020-14583/", }, { category: "self", summary: "SUSE CVE CVE-2020-14593 page", url: "https://www.suse.com/security/cve/CVE-2020-14593/", }, { category: "self", summary: "SUSE CVE CVE-2020-14621 page", url: "https://www.suse.com/security/cve/CVE-2020-14621/", }, { category: "self", summary: "SUSE CVE CVE-2020-14779 page", url: "https://www.suse.com/security/cve/CVE-2020-14779/", }, { category: "self", summary: "SUSE CVE CVE-2020-14781 page", url: "https://www.suse.com/security/cve/CVE-2020-14781/", }, { category: "self", summary: "SUSE CVE CVE-2020-14782 page", url: "https://www.suse.com/security/cve/CVE-2020-14782/", }, { category: "self", summary: "SUSE CVE CVE-2020-14792 page", url: "https://www.suse.com/security/cve/CVE-2020-14792/", }, { category: "self", summary: "SUSE CVE CVE-2020-14796 page", url: "https://www.suse.com/security/cve/CVE-2020-14796/", }, { category: "self", summary: "SUSE CVE CVE-2020-14797 page", url: "https://www.suse.com/security/cve/CVE-2020-14797/", }, { category: "self", summary: "SUSE CVE CVE-2020-14798 page", url: "https://www.suse.com/security/cve/CVE-2020-14798/", }, { category: "self", summary: "SUSE CVE CVE-2020-14803 page", url: "https://www.suse.com/security/cve/CVE-2020-14803/", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2163 page", url: "https://www.suse.com/security/cve/CVE-2021-2163/", }, { category: "self", summary: "SUSE CVE CVE-2021-2341 page", url: "https://www.suse.com/security/cve/CVE-2021-2341/", }, { category: "self", summary: "SUSE CVE CVE-2021-2369 page", url: "https://www.suse.com/security/cve/CVE-2021-2369/", }, { category: "self", summary: "SUSE CVE CVE-2021-2388 page", url: "https://www.suse.com/security/cve/CVE-2021-2388/", }, ], title: "java-15-openjdk-15.0.4.0-2.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10873-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-15-openjdk-15.0.4.0-2.1.aarch64", product: { name: "java-15-openjdk-15.0.4.0-2.1.aarch64", product_id: "java-15-openjdk-15.0.4.0-2.1.aarch64", }, }, { category: "product_version", name: "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", product: { name: "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", product_id: "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", }, }, { category: "product_version", name: "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", product: { name: "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", product_id: "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", }, }, { category: "product_version", name: "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", product: { name: "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", product_id: "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", }, }, { category: "product_version", name: "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", product: { name: "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", product_id: "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", }, }, { category: "product_version", name: "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", product: { name: "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", product_id: "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", }, }, { category: "product_version", name: "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", product: { name: "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", product_id: "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", }, }, { category: "product_version", name: "java-15-openjdk-src-15.0.4.0-2.1.aarch64", product: { name: "java-15-openjdk-src-15.0.4.0-2.1.aarch64", product_id: "java-15-openjdk-src-15.0.4.0-2.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "java-15-openjdk-15.0.4.0-2.1.ppc64le", product: { name: "java-15-openjdk-15.0.4.0-2.1.ppc64le", product_id: "java-15-openjdk-15.0.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", product: { name: "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", product_id: "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", product: { name: "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", product_id: "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", product: { name: "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", product_id: "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", product: { name: "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", product_id: "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", product: { name: "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", product_id: "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", product: { name: "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", product_id: "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", product: { name: "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", product_id: "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-15-openjdk-15.0.4.0-2.1.s390x", product: { name: "java-15-openjdk-15.0.4.0-2.1.s390x", product_id: "java-15-openjdk-15.0.4.0-2.1.s390x", }, }, { category: "product_version", name: "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", product: { name: "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", product_id: "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", }, }, { category: "product_version", name: "java-15-openjdk-demo-15.0.4.0-2.1.s390x", product: { name: "java-15-openjdk-demo-15.0.4.0-2.1.s390x", product_id: "java-15-openjdk-demo-15.0.4.0-2.1.s390x", }, }, { category: "product_version", name: "java-15-openjdk-devel-15.0.4.0-2.1.s390x", product: { name: "java-15-openjdk-devel-15.0.4.0-2.1.s390x", product_id: "java-15-openjdk-devel-15.0.4.0-2.1.s390x", }, }, { category: "product_version", name: "java-15-openjdk-headless-15.0.4.0-2.1.s390x", product: { name: "java-15-openjdk-headless-15.0.4.0-2.1.s390x", product_id: "java-15-openjdk-headless-15.0.4.0-2.1.s390x", }, }, { category: "product_version", name: "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", product: { name: "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", product_id: "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", }, }, { category: "product_version", name: "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", product: { name: "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", product_id: "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", }, }, { category: "product_version", name: "java-15-openjdk-src-15.0.4.0-2.1.s390x", product: { name: "java-15-openjdk-src-15.0.4.0-2.1.s390x", product_id: "java-15-openjdk-src-15.0.4.0-2.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-15-openjdk-15.0.4.0-2.1.x86_64", product: { name: "java-15-openjdk-15.0.4.0-2.1.x86_64", product_id: "java-15-openjdk-15.0.4.0-2.1.x86_64", }, }, { category: "product_version", name: "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", product: { name: "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", product_id: "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", }, }, { category: "product_version", name: "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", product: { name: "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", product_id: "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", }, }, { category: "product_version", name: "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", product: { name: "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", product_id: "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", }, }, { category: "product_version", name: "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", product: { name: "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", product_id: "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", }, }, { category: "product_version", name: "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", product: { name: "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", product_id: "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", }, }, { category: "product_version", name: "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", product: { name: "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", product_id: "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", }, }, { category: "product_version", name: "java-15-openjdk-src-15.0.4.0-2.1.x86_64", product: { name: "java-15-openjdk-src-15.0.4.0-2.1.x86_64", product_id: "java-15-openjdk-src-15.0.4.0-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-15-openjdk-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", }, product_reference: "java-15-openjdk-15.0.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", }, product_reference: "java-15-openjdk-15.0.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", }, product_reference: "java-15-openjdk-15.0.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", }, product_reference: "java-15-openjdk-15.0.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", }, product_reference: "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", }, product_reference: "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", }, product_reference: "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", }, product_reference: "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-demo-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", }, product_reference: "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", }, product_reference: "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-demo-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", }, product_reference: "java-15-openjdk-demo-15.0.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-demo-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", }, product_reference: "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-devel-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", }, product_reference: "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", }, product_reference: "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-devel-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", }, product_reference: "java-15-openjdk-devel-15.0.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-devel-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", }, product_reference: "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-headless-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", }, product_reference: "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", }, product_reference: "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-headless-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", }, product_reference: "java-15-openjdk-headless-15.0.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-headless-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", }, product_reference: "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", }, product_reference: "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", }, product_reference: "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", }, product_reference: "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", }, product_reference: "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", }, product_reference: "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", }, product_reference: "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-jmods-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", }, product_reference: "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", }, product_reference: "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-src-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", }, product_reference: "java-15-openjdk-src-15.0.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-src-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", }, product_reference: "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-src-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", }, product_reference: "java-15-openjdk-src-15.0.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "java-15-openjdk-src-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", }, product_reference: "java-15-openjdk-src-15.0.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2018-11212", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-11212", }, ], notes: [ { category: "general", text: "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-11212", url: "https://www.suse.com/security/cve/CVE-2018-11212", }, { category: "external", summary: "SUSE Bug 1122299 for CVE-2018-11212", url: "https://bugzilla.suse.com/1122299", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-11212", }, { cve: "CVE-2018-2790", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2790", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2790", url: "https://www.suse.com/security/cve/CVE-2018-2790", }, { category: "external", summary: "SUSE Bug 1090023 for CVE-2018-2790", url: "https://bugzilla.suse.com/1090023", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2790", url: "https://bugzilla.suse.com/1093311", }, { category: "external", summary: "SUSE Bug 1101637 for CVE-2018-2790", url: "https://bugzilla.suse.com/1101637", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-2790", }, { cve: "CVE-2018-2794", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2794", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2794", url: "https://www.suse.com/security/cve/CVE-2018-2794", }, { category: "external", summary: "SUSE Bug 1090024 for CVE-2018-2794", url: "https://bugzilla.suse.com/1090024", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2794", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2794", }, { cve: "CVE-2018-2795", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2795", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2795", url: "https://www.suse.com/security/cve/CVE-2018-2795", }, { category: "external", summary: "SUSE Bug 1090025 for CVE-2018-2795", url: "https://bugzilla.suse.com/1090025", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2795", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2795", }, { cve: "CVE-2018-2796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2796", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2796", url: "https://www.suse.com/security/cve/CVE-2018-2796", }, { category: "external", summary: "SUSE Bug 1090026 for CVE-2018-2796", url: "https://bugzilla.suse.com/1090026", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2796", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2796", }, { cve: "CVE-2018-2797", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2797", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2797", url: "https://www.suse.com/security/cve/CVE-2018-2797", }, { category: "external", summary: "SUSE Bug 1090027 for CVE-2018-2797", url: "https://bugzilla.suse.com/1090027", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2797", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2797", }, { cve: "CVE-2018-2798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2798", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2798", url: "https://www.suse.com/security/cve/CVE-2018-2798", }, { category: "external", summary: "SUSE Bug 1090028 for CVE-2018-2798", url: "https://bugzilla.suse.com/1090028", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2798", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2798", }, { cve: "CVE-2018-2799", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2799", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2799", url: "https://www.suse.com/security/cve/CVE-2018-2799", }, { category: "external", summary: "SUSE Bug 1090029 for CVE-2018-2799", url: "https://bugzilla.suse.com/1090029", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2799", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-2799", }, { cve: "CVE-2018-2814", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2814", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2814", url: "https://www.suse.com/security/cve/CVE-2018-2814", }, { category: "external", summary: "SUSE Bug 1090032 for CVE-2018-2814", url: "https://bugzilla.suse.com/1090032", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2814", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2814", }, { cve: "CVE-2018-2825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2825", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2825", url: "https://www.suse.com/security/cve/CVE-2018-2825", }, { category: "external", summary: "SUSE Bug 1090196 for CVE-2018-2825", url: "https://bugzilla.suse.com/1090196", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2825", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2825", }, { cve: "CVE-2018-2826", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2826", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2826", url: "https://www.suse.com/security/cve/CVE-2018-2826", }, { category: "external", summary: "SUSE Bug 1090197 for CVE-2018-2826", url: "https://bugzilla.suse.com/1090197", }, { category: "external", summary: "SUSE Bug 1093311 for CVE-2018-2826", url: "https://bugzilla.suse.com/1093311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2826", }, { cve: "CVE-2018-2940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2940", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2940", url: "https://www.suse.com/security/cve/CVE-2018-2940", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2940", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2940", }, { cve: "CVE-2018-2952", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2952", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2952", url: "https://www.suse.com/security/cve/CVE-2018-2952", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101651 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101651", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2952", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2952", }, { cve: "CVE-2018-2972", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2972", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2972", url: "https://www.suse.com/security/cve/CVE-2018-2972", }, { category: "external", summary: "SUSE Bug 1101655 for CVE-2018-2972", url: "https://bugzilla.suse.com/1101655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2972", }, { cve: "CVE-2018-2973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-2973", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-2973", url: "https://www.suse.com/security/cve/CVE-2018-2973", }, { category: "external", summary: "SUSE Bug 1101645 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101645", }, { category: "external", summary: "SUSE Bug 1101656 for CVE-2018-2973", url: "https://bugzilla.suse.com/1101656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-2973", }, { cve: "CVE-2018-3136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3136", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3136", url: "https://www.suse.com/security/cve/CVE-2018-3136", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3136", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3136", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3136", }, { cve: "CVE-2018-3139", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3139", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3139", url: "https://www.suse.com/security/cve/CVE-2018-3139", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3139", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3139", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3139", }, { cve: "CVE-2018-3149", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3149", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3149", url: "https://www.suse.com/security/cve/CVE-2018-3149", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3149", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3149", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-3149", }, { cve: "CVE-2018-3150", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3150", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3150", url: "https://www.suse.com/security/cve/CVE-2018-3150", }, { category: "external", summary: "SUSE Bug 1112145 for CVE-2018-3150", url: "https://bugzilla.suse.com/1112145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3150", }, { cve: "CVE-2018-3157", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3157", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Sound). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3157", url: "https://www.suse.com/security/cve/CVE-2018-3157", }, { category: "external", summary: "SUSE Bug 1112149 for CVE-2018-3157", url: "https://bugzilla.suse.com/1112149", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-3157", }, { cve: "CVE-2018-3169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3169", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3169", url: "https://www.suse.com/security/cve/CVE-2018-3169", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3169", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3169", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-3169", }, { cve: "CVE-2018-3180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3180", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3180", url: "https://www.suse.com/security/cve/CVE-2018-3180", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112147 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112147", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3180", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3180", url: "https://bugzilla.suse.com/1116574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-3180", }, { cve: "CVE-2018-3183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3183", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3183", url: "https://www.suse.com/security/cve/CVE-2018-3183", }, { category: "external", summary: "SUSE Bug 1112142 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112142", }, { category: "external", summary: "SUSE Bug 1112143 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112143", }, { category: "external", summary: "SUSE Bug 1112144 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112144", }, { category: "external", summary: "SUSE Bug 1112146 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112146", }, { category: "external", summary: "SUSE Bug 1112148 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112148", }, { category: "external", summary: "SUSE Bug 1112152 for CVE-2018-3183", url: "https://bugzilla.suse.com/1112152", }, { category: "external", summary: "SUSE Bug 1116574 for CVE-2018-3183", url: "https://bugzilla.suse.com/1116574", }, { category: "external", summary: "SUSE Bug 1120714 for CVE-2018-3183", url: "https://bugzilla.suse.com/1120714", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-3183", }, { cve: "CVE-2019-2422", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2422", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2422", url: "https://www.suse.com/security/cve/CVE-2019-2422", }, { category: "external", summary: "SUSE Bug 1122293 for CVE-2019-2422", url: "https://bugzilla.suse.com/1122293", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2422", }, { cve: "CVE-2019-2426", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2426", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2426", url: "https://www.suse.com/security/cve/CVE-2019-2426", }, { category: "external", summary: "SUSE Bug 1134297 for CVE-2019-2426", url: "https://bugzilla.suse.com/1134297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-2426", }, { cve: "CVE-2019-2602", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2602", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2602", url: "https://www.suse.com/security/cve/CVE-2019-2602", }, { category: "external", summary: "SUSE Bug 1132728 for CVE-2019-2602", url: "https://bugzilla.suse.com/1132728", }, { category: "external", summary: "SUSE Bug 1134718 for CVE-2019-2602", url: "https://bugzilla.suse.com/1134718", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2602", }, { cve: "CVE-2019-2684", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-2684", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-2684", url: "https://www.suse.com/security/cve/CVE-2019-2684", }, { category: "external", summary: "SUSE Bug 1132732 for CVE-2019-2684", url: "https://bugzilla.suse.com/1132732", }, { category: "external", summary: "SUSE Bug 1134718 for CVE-2019-2684", url: "https://bugzilla.suse.com/1134718", }, { category: "external", summary: "SUSE Bug 1184734 for CVE-2019-2684", url: "https://bugzilla.suse.com/1184734", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-2684", }, { cve: "CVE-2020-14556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14556", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14556", url: "https://www.suse.com/security/cve/CVE-2020-14556", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14556", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14556", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14556", }, { cve: "CVE-2020-14562", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14562", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14562", url: "https://www.suse.com/security/cve/CVE-2020-14562", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14562", url: "https://bugzilla.suse.com/1174157", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14562", }, { cve: "CVE-2020-14573", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14573", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14573", url: "https://www.suse.com/security/cve/CVE-2020-14573", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14573", url: "https://bugzilla.suse.com/1174157", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14573", }, { cve: "CVE-2020-14577", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14577", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14577", url: "https://www.suse.com/security/cve/CVE-2020-14577", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14577", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14577", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14577", }, { cve: "CVE-2020-14581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14581", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14581", url: "https://www.suse.com/security/cve/CVE-2020-14581", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14581", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14581", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14581", }, { cve: "CVE-2020-14583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14583", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14583", url: "https://www.suse.com/security/cve/CVE-2020-14583", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14583", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14583", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14583", }, { cve: "CVE-2020-14593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14593", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14593", url: "https://www.suse.com/security/cve/CVE-2020-14593", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14593", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14593", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14593", }, { cve: "CVE-2020-14621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14621", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14621", url: "https://www.suse.com/security/cve/CVE-2020-14621", }, { category: "external", summary: "SUSE Bug 1174157 for CVE-2020-14621", url: "https://bugzilla.suse.com/1174157", }, { category: "external", summary: "SUSE Bug 1175259 for CVE-2020-14621", url: "https://bugzilla.suse.com/1175259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14621", }, { cve: "CVE-2020-14779", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14779", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14779", url: "https://www.suse.com/security/cve/CVE-2020-14779", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14779", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14779", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14779", }, { cve: "CVE-2020-14781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14781", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14781", url: "https://www.suse.com/security/cve/CVE-2020-14781", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14781", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14781", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14781", }, { cve: "CVE-2020-14782", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14782", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14782", url: "https://www.suse.com/security/cve/CVE-2020-14782", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14782", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14782", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14782", }, { cve: "CVE-2020-14792", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14792", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14792", url: "https://www.suse.com/security/cve/CVE-2020-14792", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14792", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14792", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14792", }, { cve: "CVE-2020-14796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14796", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14796", url: "https://www.suse.com/security/cve/CVE-2020-14796", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14796", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14796", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14796", }, { cve: "CVE-2020-14797", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14797", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14797", url: "https://www.suse.com/security/cve/CVE-2020-14797", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14797", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14797", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14797", }, { cve: "CVE-2020-14798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14798", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14798", url: "https://www.suse.com/security/cve/CVE-2020-14798", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14798", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1180063 for CVE-2020-14798", url: "https://bugzilla.suse.com/1180063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14798", }, { cve: "CVE-2020-14803", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14803", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14803", url: "https://www.suse.com/security/cve/CVE-2020-14803", }, { category: "external", summary: "SUSE Bug 1177943 for CVE-2020-14803", url: "https://bugzilla.suse.com/1177943", }, { category: "external", summary: "SUSE Bug 1181239 for CVE-2020-14803", url: "https://bugzilla.suse.com/1181239", }, { category: "external", summary: "SUSE Bug 1182186 for CVE-2020-14803", url: "https://bugzilla.suse.com/1182186", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-14803", }, { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2163", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2163", url: "https://www.suse.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "SUSE Bug 1185055 for CVE-2021-2163", url: "https://bugzilla.suse.com/1185055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2163", }, { cve: "CVE-2021-2341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2341", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2341", url: "https://www.suse.com/security/cve/CVE-2021-2341", }, { category: "external", summary: "SUSE Bug 1188564 for CVE-2021-2341", url: "https://bugzilla.suse.com/1188564", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-2341", }, { cve: "CVE-2021-2369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2369", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2369", url: "https://www.suse.com/security/cve/CVE-2021-2369", }, { category: "external", summary: "SUSE Bug 1188565 for CVE-2021-2369", url: "https://bugzilla.suse.com/1188565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-2369", }, { cve: "CVE-2021-2388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2388", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2388", url: "https://www.suse.com/security/cve/CVE-2021-2388", }, { category: "external", summary: "SUSE Bug 1188566 for CVE-2021-2388", url: "https://bugzilla.suse.com/1188566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-2388", }, ], }
opensuse-su-2021:1455-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-1_8_0-openj9", title: "Title of the patch", }, { category: "description", text: "This update for java-1_8_0-openj9 fixes the following issues:\n\nUpdate to OpenJDK 8u312 build 07 with OpenJ9 0.29.0 virtual machine including\nOracle July 2021 and October 2021 CPU changes\n\n- CVE-2021-2161: Fixed incorrect handling of partially quoted arguments in ProcessBuilder on Windows (bsc#1185056).\n- CVE-2021-2163: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).\n- CVE-2021-2341: Fixed flaw inside the FtpClient (bsc#1188564).\n- CVE-2021-2369: Fixed JAR file handling problem containing multiple MANIFEST.MF files (bsc#1188565).\n- CVE-2021-2388: Fixed flaw inside the Hotspot component performed range check elimination (bsc#1188566).\n- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).\n- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).\n- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).\n- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).\n- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).\n- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).\n- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).\n- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).\n- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).\n- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-1455", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1455-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:1455-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:1455-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/", }, { category: "self", summary: "SUSE Bug 1185055", url: "https://bugzilla.suse.com/1185055", }, { category: "self", summary: "SUSE Bug 1185056", url: "https://bugzilla.suse.com/1185056", }, { category: "self", summary: "SUSE Bug 1188564", url: "https://bugzilla.suse.com/1188564", }, { category: "self", summary: "SUSE Bug 1188565", url: "https://bugzilla.suse.com/1188565", }, { category: "self", summary: "SUSE Bug 1188566", url: "https://bugzilla.suse.com/1188566", }, { category: "self", summary: "SUSE Bug 1191901", url: "https://bugzilla.suse.com/1191901", }, { category: "self", summary: "SUSE Bug 1191903", url: "https://bugzilla.suse.com/1191903", }, { category: "self", summary: "SUSE Bug 1191904", url: "https://bugzilla.suse.com/1191904", }, { category: "self", summary: "SUSE Bug 1191906", url: "https://bugzilla.suse.com/1191906", }, { category: "self", summary: "SUSE Bug 1191909", url: "https://bugzilla.suse.com/1191909", }, { category: "self", summary: "SUSE Bug 1191910", url: "https://bugzilla.suse.com/1191910", }, { category: "self", summary: "SUSE Bug 1191911", url: "https://bugzilla.suse.com/1191911", }, { category: "self", summary: "SUSE Bug 1191912", url: "https://bugzilla.suse.com/1191912", }, { category: "self", summary: "SUSE Bug 1191913", url: "https://bugzilla.suse.com/1191913", }, { category: "self", summary: "SUSE Bug 1191914", url: "https://bugzilla.suse.com/1191914", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2163 page", url: "https://www.suse.com/security/cve/CVE-2021-2163/", }, { category: "self", summary: "SUSE CVE CVE-2021-2341 page", url: "https://www.suse.com/security/cve/CVE-2021-2341/", }, { category: "self", summary: "SUSE CVE CVE-2021-2369 page", url: "https://www.suse.com/security/cve/CVE-2021-2369/", }, { category: "self", summary: "SUSE CVE CVE-2021-2388 page", url: "https://www.suse.com/security/cve/CVE-2021-2388/", }, { category: "self", summary: "SUSE CVE CVE-2021-35550 page", url: "https://www.suse.com/security/cve/CVE-2021-35550/", }, { category: "self", summary: "SUSE CVE CVE-2021-35556 page", url: "https://www.suse.com/security/cve/CVE-2021-35556/", }, { category: "self", summary: "SUSE CVE CVE-2021-35559 page", url: "https://www.suse.com/security/cve/CVE-2021-35559/", }, { category: "self", summary: "SUSE CVE CVE-2021-35561 page", url: "https://www.suse.com/security/cve/CVE-2021-35561/", }, { category: "self", summary: "SUSE CVE CVE-2021-35564 page", url: "https://www.suse.com/security/cve/CVE-2021-35564/", }, { category: "self", summary: "SUSE CVE CVE-2021-35565 page", url: "https://www.suse.com/security/cve/CVE-2021-35565/", }, { category: "self", summary: "SUSE CVE CVE-2021-35567 page", url: "https://www.suse.com/security/cve/CVE-2021-35567/", }, { category: "self", summary: "SUSE CVE CVE-2021-35578 page", url: "https://www.suse.com/security/cve/CVE-2021-35578/", }, { category: "self", summary: "SUSE CVE CVE-2021-35586 page", url: "https://www.suse.com/security/cve/CVE-2021-35586/", }, { category: "self", summary: "SUSE CVE CVE-2021-35603 page", url: "https://www.suse.com/security/cve/CVE-2021-35603/", }, ], title: "Security update for java-1_8_0-openj9", tracking: { current_release_date: "2021-11-05T23:42:40Z", generator: { date: "2021-11-05T23:42:40Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:1455-1", initial_release_date: "2021-11-05T23:42:40Z", revision_history: [ { date: "2021-11-05T23:42:40Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", product: { name: "java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", product_id: "java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", product: { name: "java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", product_id: "java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", product: { name: "java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", product_id: "java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", product: { name: "java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", product_id: "java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", product: { name: "java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", product_id: "java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", product: { name: "java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", product_id: "java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", product: { name: "java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", product_id: "java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", }, product_reference: "java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", }, product_reference: "java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", }, product_reference: "java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", }, product_reference: "java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", }, product_reference: "java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", }, product_reference: "java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", }, product_reference: "java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2163", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2163", url: "https://www.suse.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "SUSE Bug 1185055 for CVE-2021-2163", url: "https://bugzilla.suse.com/1185055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "moderate", }, ], title: "CVE-2021-2163", }, { cve: "CVE-2021-2341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2341", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2341", url: "https://www.suse.com/security/cve/CVE-2021-2341", }, { category: "external", summary: "SUSE Bug 1188564 for CVE-2021-2341", url: "https://bugzilla.suse.com/1188564", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "low", }, ], title: "CVE-2021-2341", }, { cve: "CVE-2021-2369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2369", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2369", url: "https://www.suse.com/security/cve/CVE-2021-2369", }, { category: "external", summary: "SUSE Bug 1188565 for CVE-2021-2369", url: "https://bugzilla.suse.com/1188565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "moderate", }, ], title: "CVE-2021-2369", }, { cve: "CVE-2021-2388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2388", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2388", url: "https://www.suse.com/security/cve/CVE-2021-2388", }, { category: "external", summary: "SUSE Bug 1188566 for CVE-2021-2388", url: "https://bugzilla.suse.com/1188566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "important", }, ], title: "CVE-2021-2388", }, { cve: "CVE-2021-35550", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35550", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35550", url: "https://www.suse.com/security/cve/CVE-2021-35550", }, { category: "external", summary: "SUSE Bug 1191901 for CVE-2021-35550", url: "https://bugzilla.suse.com/1191901", }, { category: "external", summary: "SUSE Bug 1193314 for CVE-2021-35550", url: "https://bugzilla.suse.com/1193314", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "moderate", }, ], title: "CVE-2021-35550", }, { cve: "CVE-2021-35556", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35556", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35556", url: "https://www.suse.com/security/cve/CVE-2021-35556", }, { category: "external", summary: "SUSE Bug 1191910 for CVE-2021-35556", url: "https://bugzilla.suse.com/1191910", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "moderate", }, ], title: "CVE-2021-35556", }, { cve: "CVE-2021-35559", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35559", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35559", url: "https://www.suse.com/security/cve/CVE-2021-35559", }, { category: "external", summary: "SUSE Bug 1191911 for CVE-2021-35559", url: "https://bugzilla.suse.com/1191911", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "moderate", }, ], title: "CVE-2021-35559", }, { cve: "CVE-2021-35561", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35561", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Utility). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35561", url: "https://www.suse.com/security/cve/CVE-2021-35561", }, { category: "external", summary: "SUSE Bug 1191912 for CVE-2021-35561", url: "https://bugzilla.suse.com/1191912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "moderate", }, ], title: "CVE-2021-35561", }, { cve: "CVE-2021-35564", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35564", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Keytool). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35564", url: "https://www.suse.com/security/cve/CVE-2021-35564", }, { category: "external", summary: "SUSE Bug 1191913 for CVE-2021-35564", url: "https://bugzilla.suse.com/1191913", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "moderate", }, ], title: "CVE-2021-35564", }, { cve: "CVE-2021-35565", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35565", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35565", url: "https://www.suse.com/security/cve/CVE-2021-35565", }, { category: "external", summary: "SUSE Bug 1191909 for CVE-2021-35565", url: "https://bugzilla.suse.com/1191909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "moderate", }, ], title: "CVE-2021-35565", }, { cve: "CVE-2021-35567", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35567", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via Kerberos to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35567", url: "https://www.suse.com/security/cve/CVE-2021-35567", }, { category: "external", summary: "SUSE Bug 1191903 for CVE-2021-35567", url: "https://bugzilla.suse.com/1191903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "moderate", }, ], title: "CVE-2021-35567", }, { cve: "CVE-2021-35578", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35578", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35578", url: "https://www.suse.com/security/cve/CVE-2021-35578", }, { category: "external", summary: "SUSE Bug 1191904 for CVE-2021-35578", url: "https://bugzilla.suse.com/1191904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "moderate", }, ], title: "CVE-2021-35578", }, { cve: "CVE-2021-35586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35586", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35586", url: "https://www.suse.com/security/cve/CVE-2021-35586", }, { category: "external", summary: "SUSE Bug 1191914 for CVE-2021-35586", url: "https://bugzilla.suse.com/1191914", }, { category: "external", summary: "SUSE Bug 1194928 for CVE-2021-35586", url: "https://bugzilla.suse.com/1194928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "moderate", }, ], title: "CVE-2021-35586", }, { cve: "CVE-2021-35603", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-35603", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-35603", url: "https://www.suse.com/security/cve/CVE-2021-35603", }, { category: "external", summary: "SUSE Bug 1191906 for CVE-2021-35603", url: "https://bugzilla.suse.com/1191906", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-11-05T23:42:40Z", details: "low", }, ], title: "CVE-2021-35603", }, ], }
opensuse-su-2021:2798-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-1_8_0-openjdk", title: "Title of the patch", }, { category: "description", text: "This update for java-1_8_0-openjdk fixes the following issues:\n\n- Update to version jdk8u302 (icedtea 3.20.0)\n- CVE-2021-2341: Improve file transfers. (bsc#1188564)\n- CVE-2021-2369: Better jar file validation. (bsc#1188565)\n- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)\n- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2021-2798", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2798-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:2798-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:2798-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/", }, { category: "self", summary: "SUSE Bug 1185056", url: "https://bugzilla.suse.com/1185056", }, { category: "self", summary: "SUSE Bug 1188564", url: "https://bugzilla.suse.com/1188564", }, { category: "self", summary: "SUSE Bug 1188565", url: "https://bugzilla.suse.com/1188565", }, { category: "self", summary: "SUSE Bug 1188566", url: "https://bugzilla.suse.com/1188566", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2341 page", url: "https://www.suse.com/security/cve/CVE-2021-2341/", }, { category: "self", summary: "SUSE CVE CVE-2021-2369 page", url: "https://www.suse.com/security/cve/CVE-2021-2369/", }, { category: "self", summary: "SUSE CVE CVE-2021-2388 page", url: "https://www.suse.com/security/cve/CVE-2021-2388/", }, ], title: "Security update for java-1_8_0-openjdk", tracking: { current_release_date: "2021-08-20T08:38:22Z", generator: { date: "2021-08-20T08:38:22Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:2798-1", initial_release_date: "2021-08-20T08:38:22Z", revision_history: [ { date: "2021-08-20T08:38:22Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", product: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", product_id: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", product_id: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", product: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", product_id: "java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", product: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", product_id: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", product_id: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", product: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", product_id: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", product_id: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", product: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", product_id: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", product_id: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", }, product_reference: "java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-20T08:38:22Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2341", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2341", url: "https://www.suse.com/security/cve/CVE-2021-2341", }, { category: "external", summary: "SUSE Bug 1188564 for CVE-2021-2341", url: "https://bugzilla.suse.com/1188564", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-20T08:38:22Z", details: "low", }, ], title: "CVE-2021-2341", }, { cve: "CVE-2021-2369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2369", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2369", url: "https://www.suse.com/security/cve/CVE-2021-2369", }, { category: "external", summary: "SUSE Bug 1188565 for CVE-2021-2369", url: "https://bugzilla.suse.com/1188565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-20T08:38:22Z", details: "moderate", }, ], title: "CVE-2021-2369", }, { cve: "CVE-2021-2388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2388", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2388", url: "https://www.suse.com/security/cve/CVE-2021-2388", }, { category: "external", summary: "SUSE Bug 1188566 for CVE-2021-2388", url: "https://bugzilla.suse.com/1188566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-20T08:38:22Z", details: "important", }, ], title: "CVE-2021-2388", }, ], }
opensuse-su-2021:1176-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-1_8_0-openjdk", title: "Title of the patch", }, { category: "description", text: "This update for java-1_8_0-openjdk fixes the following issues:\n\n- Update to version jdk8u302 (icedtea 3.20.0)\n- CVE-2021-2341: Improve file transfers. (bsc#1188564)\n- CVE-2021-2369: Better jar file validation. (bsc#1188565)\n- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)\n- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-1176", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1176-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:1176-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:1176-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/", }, { category: "self", summary: "SUSE Bug 1185056", url: "https://bugzilla.suse.com/1185056", }, { category: "self", summary: "SUSE Bug 1188564", url: "https://bugzilla.suse.com/1188564", }, { category: "self", summary: "SUSE Bug 1188565", url: "https://bugzilla.suse.com/1188565", }, { category: "self", summary: "SUSE Bug 1188566", url: "https://bugzilla.suse.com/1188566", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2341 page", url: "https://www.suse.com/security/cve/CVE-2021-2341/", }, { category: "self", summary: "SUSE CVE CVE-2021-2369 page", url: "https://www.suse.com/security/cve/CVE-2021-2369/", }, { category: "self", summary: "SUSE CVE CVE-2021-2388 page", url: "https://www.suse.com/security/cve/CVE-2021-2388/", }, ], title: "Security update for java-1_8_0-openjdk", tracking: { current_release_date: "2021-08-21T08:26:44Z", generator: { date: "2021-08-21T08:26:44Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:1176-1", initial_release_date: "2021-08-21T08:26:44Z", revision_history: [ { date: "2021-08-21T08:26:44Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", product: { name: "java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", product_id: "java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", product_id: "java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", product: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", product_id: "java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", product: { name: "java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", product_id: "java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", product_id: "java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", }, product_reference: "java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", }, product_reference: "java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", }, product_reference: "java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", }, product_reference: "java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", }, product_reference: "java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-21T08:26:44Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2341", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2341", url: "https://www.suse.com/security/cve/CVE-2021-2341", }, { category: "external", summary: "SUSE Bug 1188564 for CVE-2021-2341", url: "https://bugzilla.suse.com/1188564", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-21T08:26:44Z", details: "low", }, ], title: "CVE-2021-2341", }, { cve: "CVE-2021-2369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2369", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2369", url: "https://www.suse.com/security/cve/CVE-2021-2369", }, { category: "external", summary: "SUSE Bug 1188565 for CVE-2021-2369", url: "https://bugzilla.suse.com/1188565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-21T08:26:44Z", details: "moderate", }, ], title: "CVE-2021-2369", }, { cve: "CVE-2021-2388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2388", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2388", url: "https://www.suse.com/security/cve/CVE-2021-2388", }, { category: "external", summary: "SUSE Bug 1188566 for CVE-2021-2388", url: "https://bugzilla.suse.com/1188566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-21T08:26:44Z", details: "important", }, ], title: "CVE-2021-2388", }, ], }
fkie_cve-2021-2161
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:jdk:1.7.0:update291:*:*:*:*:*:*", matchCriteriaId: "CC7644D5-EEA1-4FA8-8F5E-9C476DACF956", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:jdk:1.8.0:update281:*:*:*:*:*:*", matchCriteriaId: "3484EAC9-2F68-4952-8F0B-D1B83B5956CD", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:jdk:11.0.10:*:*:*:*:*:*:*", matchCriteriaId: "5FCE2C42-BFFB-4E1E-9E37-07F334BA3C12", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:jdk:16.0.0:*:*:*:*:*:*:*", matchCriteriaId: "16BDD043-0138-4F9E-A369-B1AA779CA4C4", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:jre:1.8.0:update281:*:*:*:*:*:*", matchCriteriaId: "6DFA7B46-AA37-4943-81A1-DF8C7F2CB038", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", matchCriteriaId: "E460AA51-FCDA-46B9-AE97-E6676AA5E194", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*", matchCriteriaId: "058C7C4B-D692-49DE-924A-C2725A8162D3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*", matchCriteriaId: "0F0434A5-F2A1-4973-917C-A95F2ABE97D1", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*", matchCriteriaId: "96DD93E0-274E-4C36-99F3-EEF085E57655", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", matchCriteriaId: "C5344C25-BD71-4228-903F-E419A4455F5F", versionEndIncluding: "11.0.10", versionStartIncluding: "11", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", matchCriteriaId: "4D1453F5-ABB5-48F8-9C1C-69EEEE3949A5", versionEndIncluding: "13.0.6", versionStartIncluding: "13", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", matchCriteriaId: "8602555C-1C07-4A4C-8DBB-5D304366A7E7", versionEndIncluding: "15.0.2", versionStartIncluding: "15", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*", matchCriteriaId: "E78B7C5A-FA51-41E4-AAB0-C6DED2EFCF4C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*", matchCriteriaId: "02011EDC-20A7-4A16-A592-7C76E0037997", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*", matchCriteriaId: "AC6D4652-1226-4C60-BEDF-01EBF8AC0849", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*", matchCriteriaId: "3C1F9ED7-7D93-41F4-9130-15BA734420AC", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*", matchCriteriaId: "1CF9CDF1-95D3-4125-A73F-396D2280FC4E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*", matchCriteriaId: "A13266DC-F8D9-4F30-987F-65BBEAF8D3A8", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*", matchCriteriaId: "C28388AB-CFC9-4749-A90F-383F5B905EA9", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*", matchCriteriaId: "DA1B00F9-A81C-48B7-8DAA-F394DDF323F3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*", matchCriteriaId: "CA7AD457-6CE6-4925-8D94-A907B40233D9", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*", matchCriteriaId: "A6F3FDD1-7CAC-4B84-ABB7-64E9D3FBD708", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*", matchCriteriaId: "5480E5AD-DB46-474A-9B57-84ED088A75FA", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*", matchCriteriaId: "881A4AE9-6012-4E91-98BE-0A352CC20703", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*", matchCriteriaId: "7E1E1079-57D9-473B-A017-964F4745F329", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*", matchCriteriaId: "B8D6446E-2915-4F12-87BE-E7420BC2626E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*", matchCriteriaId: "564EDCE3-16E6-401D-8A43-032D1F8875E1", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*", matchCriteriaId: "08278802-D31B-488A-BA6A-EBC816DF883A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*", matchCriteriaId: "72BDA05A-C8BD-472E-8465-EE1F3E5D8CF6", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*", matchCriteriaId: "7BBB0969-565E-43E2-B067-A10AAA5F1958", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*", matchCriteriaId: "D78BE95D-6270-469A-8035-FCDDB398F952", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*", matchCriteriaId: "88C24F40-3150-4584-93D9-8307DE04EEE9", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*", matchCriteriaId: "E0FC5A03-FF11-4787-BBF1-3ACF93A21F2D", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*", matchCriteriaId: "19626B36-62FC-4497-A2E1-7D6CD9839B19", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*", matchCriteriaId: "5713AEBD-35F6-44E8-A0CC-A42830D7AE20", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*", matchCriteriaId: "8BE0C04B-440E-4B35-ACC8-6264514F764C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*", matchCriteriaId: "555EC2A6-0475-48ED-AE0C-B306714A9333", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*", matchCriteriaId: "EC1CF2AD-3F7A-4EF3-BD41-117A21553A9F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*", matchCriteriaId: "02C55E2E-AEDE-455C-B128-168C918B5D97", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*", matchCriteriaId: "81831D37-6597-441B-87DE-38F7191BEA42", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*", matchCriteriaId: "EEA1594D-0AB5-436D-9E60-C26EE2175753", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*", matchCriteriaId: "B868FA41-C71B-491C-880B-484740B30C72", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*", matchCriteriaId: "C242D3BE-9114-4A9E-BB78-45754C7CC450", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*", matchCriteriaId: "D61068FE-18EE-4ADB-BC69-A3ECE8724575", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*", matchCriteriaId: "EFB59E80-4EC4-4399-BF40-6733E4E475A9", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*", matchCriteriaId: "84E31265-22E1-4E91-BFCB-D2AFF445926A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*", matchCriteriaId: "AB3A58C3-94BB-4120-BE1D-AAF8BBF7F22B", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*", matchCriteriaId: "50319E52-8739-47C5-B61E-3CA9B6A9A48F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*", matchCriteriaId: "7ED515B9-DC74-4DC5-B98A-08D87D85E11E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*", matchCriteriaId: "6D1D4868-1F9F-43F7-968C-6469B67D3F1B", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*", matchCriteriaId: "568F1AC4-B0D7-4438-82E5-0E61500F2240", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*", matchCriteriaId: "F5E99B4A-EDAD-4471-81C4-7E9C775C9D9F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*", matchCriteriaId: "14E9133E-9FF3-40DB-9A11-7469EF5FD265", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*", matchCriteriaId: "94834710-3FA9-49D9-8600-B514CBCA4270", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*", matchCriteriaId: "4228D9E1-7D82-4B49-9669-9CDAD7187432", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*", matchCriteriaId: "F6231F48-2936-4F7D-96D5-4BA11F78EBE8", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*", matchCriteriaId: "D96D5061-4A81-497E-9AD6-A8381B3B454C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*", matchCriteriaId: "5345C21E-A01B-43B9-9A20-F2783D921C60", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*", matchCriteriaId: "B219F360-83BD-4111-AB59-C9D4F55AF4C0", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*", matchCriteriaId: "D25377EA-8E8F-4C76-8EA9-3BBDFB352815", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*", matchCriteriaId: "59FEFE05-269A-4EAF-A80F-E4C2107B1197", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*", matchCriteriaId: "E7E2AA7C-F602-4DB7-9EC1-0708C46C253C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*", matchCriteriaId: "FB70E154-A304-429E-80F5-8D87B00E32D1", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*", matchCriteriaId: "70892D06-6E75-4425-BBF0-4B684EC62A1C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*", matchCriteriaId: "7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*", matchCriteriaId: "7417B2BB-9AC2-4AF4-A828-C89A0735AD92", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*", matchCriteriaId: "6A0A57B5-6F88-4288-9CDE-F6613FE068D2", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*", matchCriteriaId: "67ED8559-C348-4932-B7CE-CB96976A30EC", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*", matchCriteriaId: "40AC3D91-263F-4345-9FAA-0E573EA64590", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*", matchCriteriaId: "DD92AFA9-81F8-48D4-B79A-E7F066F69A99", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*", matchCriteriaId: "2C4B2F24-A730-4818-90C8-A2D90C081F03", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*", matchCriteriaId: "464087F2-C285-4574-957E-CE0663F07DE0", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*", matchCriteriaId: "3E9BB880-A4F6-4887-8BB9-47AA298753D5", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*", matchCriteriaId: "18DCFF53-B298-4534-AB5C-8A5EF59C616F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*", matchCriteriaId: "083419F8-FDDF-4E36-88F8-857DB317C1D1", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*", matchCriteriaId: "D7A74F65-57E8-4C9A-BA96-5EF401504F13", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*", matchCriteriaId: "0D0B90FC-57B6-4315-9B29-3C36E58B2CF5", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*", matchCriteriaId: "07812576-3C35-404C-A7D7-9BE9E3D76E00", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*", matchCriteriaId: "00C52B1C-5447-4282-9667-9EBE0720B423", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*", matchCriteriaId: "92BB9EB0-0C12-4E77-89EE-FB77097841B8", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*", matchCriteriaId: "FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*", matchCriteriaId: "ABC0E7BB-F8B7-4369-9910-71240E4073A3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*", matchCriteriaId: "551B2640-8CEC-4C24-AF8B-7A7CEF864D9D", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*", matchCriteriaId: "0AE30779-48FB-451E-8CE1-F469F93B8772", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*", matchCriteriaId: "60590FDE-7156-4314-A012-AA38BD2ADDC9", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*", matchCriteriaId: "BE51AD3A-8331-4E8F-9DB1-7A0051731DFB", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*", matchCriteriaId: "F24F6122-2256-41B6-9033-794C6424ED99", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*", matchCriteriaId: "0EAFA79E-8C7A-48CF-8868-11378FE4B26F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*", matchCriteriaId: "D1D6F19F-59B5-4BB6-AD35-013384025970", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*", matchCriteriaId: "E7BA97BC-3ADA-465A-835B-6C3C5F416B56", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*", matchCriteriaId: "B71F77A4-B7EB-47A1-AAFD-431A7D040B86", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*", matchCriteriaId: "91D6BEA9-5943-44A4-946D-CEAA9BA99376", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*", matchCriteriaId: "C079A3E0-44EB-4B9C-B4FC-B7621D165C3B", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*", matchCriteriaId: "2CB74086-14B8-4237-8357-E0C6B5BB8313", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*", matchCriteriaId: "3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*", matchCriteriaId: "00C2B9C9-1177-4DA6-96CE-55F37F383F99", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*", matchCriteriaId: "435CF189-0BD8-40DF-A0DC-99862CDEAF8A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*", matchCriteriaId: "12A3F367-33AD-47C3-BFDC-871A17E72C94", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*", matchCriteriaId: "A18F994F-72CA-4AF5-A7D1-9F5AEA286D85", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*", matchCriteriaId: "78261932-7373-4F16-91E0-1A72ADBEBC3E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*", matchCriteriaId: "9BD90D3D-9B3A-4101-9A8A-5090F0A9719F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*", matchCriteriaId: "B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*", matchCriteriaId: "F5A40B8A-D428-4008-9F21-AF21394C51D1", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*", matchCriteriaId: "FEC5B777-01E1-45EE-AF95-C3BD1F098B2F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*", matchCriteriaId: "3B504718-5DCE-43B4-B19A-C6B6E7444BD3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*", matchCriteriaId: "3102AA10-99A8-49A9-867E-7EEC56865680", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*", matchCriteriaId: "5A55CBC7-A7B2-4B89-8AB5-ED30DBE6814E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*", matchCriteriaId: "F8483034-DD5A-445D-892F-CDE90A7D58EE", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*", matchCriteriaId: "8279718F-878F-4868-8859-1728D13CD0D8", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*", matchCriteriaId: "2C024E1A-FD2C-42E8-B227-C2AFD3040436", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*", matchCriteriaId: "4F24389D-DDD0-4204-AA24-31C920A4F47E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*", matchCriteriaId: "966979BE-1F21-4729-B6B8-610F74648344", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*", matchCriteriaId: "F8534265-33BF-460D-BF74-5F55FDE50F29", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*", matchCriteriaId: "F77AFC25-1466-4E56-9D5F-6988F3288E16", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*", matchCriteriaId: "A650BEB8-E56F-4E42-9361-8D2DB083F0F8", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*", matchCriteriaId: "799FFECD-E80A-44B3-953D-CDB5E195F3AA", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*", matchCriteriaId: "A7047507-7CAF-4A14-AA9A-5CEF806EDE98", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*", matchCriteriaId: "CFC7B179-95D3-4F94-84F6-73F1034A1AF2", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*", matchCriteriaId: "9FB28526-9385-44CA-AF08-1899E6C3AE4D", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*", matchCriteriaId: "E26B69E4-0B43-415F-A82B-52FDCB262B3E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*", matchCriteriaId: "27BC4150-70EC-462B-8FC5-20B3442CBB31", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*", matchCriteriaId: "02646989-ECD9-40AE-A83E-EFF4080C69B9", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:openjdk:16:*:*:*:*:*:*:*", matchCriteriaId: "DCFB65CD-98D5-4024-86CF-130D70DC5A5F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", matchCriteriaId: "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", matchCriteriaId: "B55E8D50-99B4-47EC-86F9-699B67D473CE", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", matchCriteriaId: "A3C19813-E823-456A-B1CE-EC0684CE1953", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", matchCriteriaId: "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", vulnerable: true, }, { criteria: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", matchCriteriaId: "AD7447BC-F315-4298-A822-549942FC118B", vulnerable: true, }, { criteria: "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", matchCriteriaId: "02DEB4FB-A21D-4CB1-B522-EEE5093E8521", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*", matchCriteriaId: "A30F7908-5AF6-4761-BC6A-4C18EFAE48E5", versionEndExcluding: "5.10.0", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*", matchCriteriaId: "0F30D3AF-4FA3-4B7A-BE04-C24E2EA19A95", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*", matchCriteriaId: "7B00DDE7-7002-45BE-8EDE-65D964922CB0", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*", matchCriteriaId: "DB88C165-BB24-49FB-AAF6-087A766D5AD1", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*", matchCriteriaId: "FF806B52-DAD5-4D12-8BB6-3CBF9DC6B8DF", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*", matchCriteriaId: "7DE847E0-431D-497D-9C57-C4E59749F6A0", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*", matchCriteriaId: "46385384-5561-40AA-9FDE-A2DE4FDFAD3E", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*", matchCriteriaId: "B7CA7CA6-7CF2-48F6-81B5-69BA0A37EF4E", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*", matchCriteriaId: "9E4E5481-1070-4E1F-8679-1985DE4E785A", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*", matchCriteriaId: "D9EEA681-67FF-43B3-8610-0FA17FD279E5", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*", matchCriteriaId: "C33BA8EA-793D-4E79-BE9C-235ACE717216", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*", matchCriteriaId: "823DBE80-CB8D-4981-AE7C-28F3FDD40451", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", }, { lang: "es", value: "Una vulnerabilidad en el producto Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Libraries). Las versiones compatibles que están afectadas son Java SE: 7u291, 8u281, 11.0.10, 16; Java SE integrado: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 y 21.0.0.2. La vulnerabilidad difícil de explotar permite a un atacante no autenticado con acceso a la red por medio de múltiples protocolos comprometer a Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Los ataques con éxito de esta vulnerabilidad pueden resultar en la creación, eliminación o modificación no autorizada del acceso a datos críticos o todos los datos accesibles de Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se aplica a las implementaciones de Java que cargan y ejecutan código que no es confiable (p. Ej., código que proviene de Internet) y confía en el sandbox de Java para la seguridad. También puede ser explotado proporcionando datos no confiables a las API en el Componente especificado. CVSS 3.1 Puntuación Base 5.9 (Impactos en la Integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)", }, ], id: "CVE-2021-2161", lastModified: "2024-11-21T06:02:30.543", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "secalert_us@oracle.com", type: "Secondary", }, ], }, published: "2021-04-22T22:15:13.037", references: [ { source: "secalert_us@oracle.com", tags: [ "Third Party Advisory", ], url: "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures", }, { source: "secalert_us@oracle.com", tags: [ "Third Party Advisory", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", }, { source: "secalert_us@oracle.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html", }, { source: "secalert_us@oracle.com", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/", }, { source: "secalert_us@oracle.com", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/", }, { source: "secalert_us@oracle.com", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/", }, { source: "secalert_us@oracle.com", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/", }, { source: "secalert_us@oracle.com", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/", }, { source: "secalert_us@oracle.com", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/", }, { source: "secalert_us@oracle.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202209-05", }, { source: "secalert_us@oracle.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20210513-0001/", }, { source: "secalert_us@oracle.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4899", }, { source: "secalert_us@oracle.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.oracle.com/security-alerts/cpuapr2021.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202209-05", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20210513-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4899", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.oracle.com/security-alerts/cpuapr2021.html", }, ], sourceIdentifier: "secalert_us@oracle.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
RHSA-2021:1447
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 11 (11.0.11) for Windows serves as a replacement for the Red Hat build of OpenJDK 11 (11.0.10) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568) (CVE-2021-2161)\n\n* OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) (CVE-2021-2163)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1447", url: "https://access.redhat.com/errata/RHSA-2021:1447", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=core.service.openjdk&version=11.0.11.9", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=core.service.openjdk&version=11.0.11.9", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", url: "https://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/openjdk/11/html/configuring_openjdk_11_for_windows/index", url: "https://access.redhat.com/documentation/en-us/openjdk/11/html/configuring_openjdk_11_for_windows/index", }, { category: "external", summary: "https://openjdk.java.net/groups/vulnerability/advisories/2021-04-20", url: "https://openjdk.java.net/groups/vulnerability/advisories/2021-04-20", }, { category: "external", summary: "1951217", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", }, { category: "external", summary: "1951231", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1447.json", }, ], title: "Red Hat Security Advisory: OpenJDK 11.0.11 Security Update for Windows Builds", tracking: { current_release_date: "2024-11-22T16:34:45+00:00", generator: { date: "2024-11-22T16:34:45+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1447", initial_release_date: "2021-04-28T12:34:40+00:00", revision_history: [ { date: "2021-04-28T12:34:40+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-28T12:34:40+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:34:45+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Build of OpenJDK", product: { name: "Red Hat Build of OpenJDK", product_id: "Red Hat Build of OpenJDK", product_identification_helper: { cpe: "cpe:/a:redhat:openjdk:11.0.11::windows", }, }, }, ], category: "product_family", name: "OpenJDK", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", cwe: { id: "CWE-78", name: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", }, discovery_date: "2021-03-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951231", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat Build of OpenJDK", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "RHBZ#1951231", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-2161", url: "https://www.cve.org/CVERecord?id=CVE-2021-2161", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", }, ], release_date: "2021-04-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-28T12:34:40+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", product_ids: [ "Red Hat Build of OpenJDK", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1447", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "Red Hat Build of OpenJDK", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568)", }, { cve: "CVE-2021-2163", cwe: { id: "CWE-327", name: "Use of a Broken or Risky Cryptographic Algorithm", }, discovery_date: "2021-03-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951217", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat Build of OpenJDK", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "RHBZ#1951217", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-2163", url: "https://www.cve.org/CVERecord?id=CVE-2021-2163", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-2163", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2163", }, ], release_date: "2021-04-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-28T12:34:40+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", product_ids: [ "Red Hat Build of OpenJDK", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1447", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "Red Hat Build of OpenJDK", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)", }, ], }
rhsa-2021_1447
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 11 (11.0.11) for Windows serves as a replacement for the Red Hat build of OpenJDK 11 (11.0.10) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568) (CVE-2021-2161)\n\n* OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) (CVE-2021-2163)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1447", url: "https://access.redhat.com/errata/RHSA-2021:1447", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=core.service.openjdk&version=11.0.11.9", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=core.service.openjdk&version=11.0.11.9", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", url: "https://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/openjdk/11/html/configuring_openjdk_11_for_windows/index", url: "https://access.redhat.com/documentation/en-us/openjdk/11/html/configuring_openjdk_11_for_windows/index", }, { category: "external", summary: "https://openjdk.java.net/groups/vulnerability/advisories/2021-04-20", url: "https://openjdk.java.net/groups/vulnerability/advisories/2021-04-20", }, { category: "external", summary: "1951217", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", }, { category: "external", summary: "1951231", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1447.json", }, ], title: "Red Hat Security Advisory: OpenJDK 11.0.11 Security Update for Windows Builds", tracking: { current_release_date: "2024-11-22T16:34:45+00:00", generator: { date: "2024-11-22T16:34:45+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1447", initial_release_date: "2021-04-28T12:34:40+00:00", revision_history: [ { date: "2021-04-28T12:34:40+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-28T12:34:40+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:34:45+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Build of OpenJDK", product: { name: "Red Hat Build of OpenJDK", product_id: "Red Hat Build of OpenJDK", product_identification_helper: { cpe: "cpe:/a:redhat:openjdk:11.0.11::windows", }, }, }, ], category: "product_family", name: "OpenJDK", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", cwe: { id: "CWE-78", name: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", }, discovery_date: "2021-03-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951231", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat Build of OpenJDK", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "RHBZ#1951231", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-2161", url: "https://www.cve.org/CVERecord?id=CVE-2021-2161", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", }, ], release_date: "2021-04-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-28T12:34:40+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", product_ids: [ "Red Hat Build of OpenJDK", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1447", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "Red Hat Build of OpenJDK", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568)", }, { cve: "CVE-2021-2163", cwe: { id: "CWE-327", name: "Use of a Broken or Risky Cryptographic Algorithm", }, discovery_date: "2021-03-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951217", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat Build of OpenJDK", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "RHBZ#1951217", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-2163", url: "https://www.cve.org/CVERecord?id=CVE-2021-2163", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-2163", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2163", }, ], release_date: "2021-04-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-28T12:34:40+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", product_ids: [ "Red Hat Build of OpenJDK", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1447", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "Red Hat Build of OpenJDK", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)", }, ], }
rhsa-2021:1447
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 11 (11.0.11) for Windows serves as a replacement for the Red Hat build of OpenJDK 11 (11.0.10) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568) (CVE-2021-2161)\n\n* OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) (CVE-2021-2163)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1447", url: "https://access.redhat.com/errata/RHSA-2021:1447", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=core.service.openjdk&version=11.0.11.9", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=core.service.openjdk&version=11.0.11.9", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", url: "https://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/openjdk/11/html/configuring_openjdk_11_for_windows/index", url: "https://access.redhat.com/documentation/en-us/openjdk/11/html/configuring_openjdk_11_for_windows/index", }, { category: "external", summary: "https://openjdk.java.net/groups/vulnerability/advisories/2021-04-20", url: "https://openjdk.java.net/groups/vulnerability/advisories/2021-04-20", }, { category: "external", summary: "1951217", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", }, { category: "external", summary: "1951231", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1447.json", }, ], title: "Red Hat Security Advisory: OpenJDK 11.0.11 Security Update for Windows Builds", tracking: { current_release_date: "2024-11-22T16:34:45+00:00", generator: { date: "2024-11-22T16:34:45+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1447", initial_release_date: "2021-04-28T12:34:40+00:00", revision_history: [ { date: "2021-04-28T12:34:40+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-28T12:34:40+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:34:45+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Build of OpenJDK", product: { name: "Red Hat Build of OpenJDK", product_id: "Red Hat Build of OpenJDK", product_identification_helper: { cpe: "cpe:/a:redhat:openjdk:11.0.11::windows", }, }, }, ], category: "product_family", name: "OpenJDK", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", cwe: { id: "CWE-78", name: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", }, discovery_date: "2021-03-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951231", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat Build of OpenJDK", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "RHBZ#1951231", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-2161", url: "https://www.cve.org/CVERecord?id=CVE-2021-2161", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", }, ], release_date: "2021-04-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-28T12:34:40+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", product_ids: [ "Red Hat Build of OpenJDK", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1447", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "Red Hat Build of OpenJDK", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568)", }, { cve: "CVE-2021-2163", cwe: { id: "CWE-327", name: "Use of a Broken or Risky Cryptographic Algorithm", }, discovery_date: "2021-03-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951217", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat Build of OpenJDK", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "RHBZ#1951217", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-2163", url: "https://www.cve.org/CVERecord?id=CVE-2021-2163", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-2163", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2163", }, ], release_date: "2021-04-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-28T12:34:40+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", product_ids: [ "Red Hat Build of OpenJDK", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1447", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "Red Hat Build of OpenJDK", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)", }, ], }
rhsa-2021_1445
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The Red Hat Build of OpenJDK 8 (java-1.8.0-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 8 (1.8.0.292) for Windows serves as a replacement for the Red Hat build of OpenJDK 8 (1.8.0.282) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568) (CVE-2021-2161)\n\n* OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) (CVE-2021-2163)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1445", url: "https://access.redhat.com/errata/RHSA-2021:1445", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=core.service.openjdk&version=1.8.0.292", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=core.service.openjdk&version=1.8.0.292", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", url: "https://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/openjdk/8/html/troubleshooting_openjdk_8_for_windows/index", url: "https://access.redhat.com/documentation/en-us/openjdk/8/html/troubleshooting_openjdk_8_for_windows/index", }, { category: "external", summary: "https://openjdk.java.net/groups/vulnerability/advisories/2021-04-20", url: "https://openjdk.java.net/groups/vulnerability/advisories/2021-04-20", }, { category: "external", summary: "1951217", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", }, { category: "external", summary: "1951231", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1445.json", }, ], title: "Red Hat Security Advisory: OpenJDK 8u292 Windows Builds release and security update", tracking: { current_release_date: "2024-11-22T16:34:37+00:00", generator: { date: "2024-11-22T16:34:37+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1445", initial_release_date: "2021-04-28T12:34:14+00:00", revision_history: [ { date: "2021-04-28T12:34:14+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-28T12:34:14+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:34:37+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Build of OpenJDK", product: { name: "Red Hat Build of OpenJDK", product_id: "Red Hat Build of OpenJDK", product_identification_helper: { cpe: "cpe:/a:redhat:openjdk:1.8::windows", }, }, }, ], category: "product_family", name: "OpenJDK", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", cwe: { id: "CWE-78", name: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", }, discovery_date: "2021-03-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951231", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat Build of OpenJDK", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "RHBZ#1951231", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-2161", url: "https://www.cve.org/CVERecord?id=CVE-2021-2161", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", }, ], release_date: "2021-04-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-28T12:34:14+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", product_ids: [ "Red Hat Build of OpenJDK", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1445", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "Red Hat Build of OpenJDK", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568)", }, { cve: "CVE-2021-2163", cwe: { id: "CWE-327", name: "Use of a Broken or Risky Cryptographic Algorithm", }, discovery_date: "2021-03-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951217", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat Build of OpenJDK", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "RHBZ#1951217", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-2163", url: "https://www.cve.org/CVERecord?id=CVE-2021-2163", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-2163", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2163", }, ], release_date: "2021-04-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-28T12:34:14+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", product_ids: [ "Red Hat Build of OpenJDK", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1445", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "Red Hat Build of OpenJDK", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)", }, ], }
rhsa-2021:1445
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The Red Hat Build of OpenJDK 8 (java-1.8.0-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 8 (1.8.0.292) for Windows serves as a replacement for the Red Hat build of OpenJDK 8 (1.8.0.282) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568) (CVE-2021-2161)\n\n* OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) (CVE-2021-2163)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1445", url: "https://access.redhat.com/errata/RHSA-2021:1445", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=core.service.openjdk&version=1.8.0.292", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=core.service.openjdk&version=1.8.0.292", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", url: "https://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/openjdk/8/html/troubleshooting_openjdk_8_for_windows/index", url: "https://access.redhat.com/documentation/en-us/openjdk/8/html/troubleshooting_openjdk_8_for_windows/index", }, { category: "external", summary: "https://openjdk.java.net/groups/vulnerability/advisories/2021-04-20", url: "https://openjdk.java.net/groups/vulnerability/advisories/2021-04-20", }, { category: "external", summary: "1951217", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", }, { category: "external", summary: "1951231", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1445.json", }, ], title: "Red Hat Security Advisory: OpenJDK 8u292 Windows Builds release and security update", tracking: { current_release_date: "2024-11-22T16:34:37+00:00", generator: { date: "2024-11-22T16:34:37+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1445", initial_release_date: "2021-04-28T12:34:14+00:00", revision_history: [ { date: "2021-04-28T12:34:14+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-28T12:34:14+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:34:37+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Build of OpenJDK", product: { name: "Red Hat Build of OpenJDK", product_id: "Red Hat Build of OpenJDK", product_identification_helper: { cpe: "cpe:/a:redhat:openjdk:1.8::windows", }, }, }, ], category: "product_family", name: "OpenJDK", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", cwe: { id: "CWE-78", name: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", }, discovery_date: "2021-03-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951231", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat Build of OpenJDK", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "RHBZ#1951231", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-2161", url: "https://www.cve.org/CVERecord?id=CVE-2021-2161", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", }, ], release_date: "2021-04-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-28T12:34:14+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", product_ids: [ "Red Hat Build of OpenJDK", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1445", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "Red Hat Build of OpenJDK", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568)", }, { cve: "CVE-2021-2163", cwe: { id: "CWE-327", name: "Use of a Broken or Risky Cryptographic Algorithm", }, discovery_date: "2021-03-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951217", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat Build of OpenJDK", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "RHBZ#1951217", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-2163", url: "https://www.cve.org/CVERecord?id=CVE-2021-2163", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-2163", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2163", }, ], release_date: "2021-04-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-28T12:34:14+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", product_ids: [ "Red Hat Build of OpenJDK", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1445", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "Red Hat Build of OpenJDK", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)", }, ], }
RHSA-2021:1445
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "The Red Hat Build of OpenJDK 8 (java-1.8.0-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 8 (1.8.0.292) for Windows serves as a replacement for the Red Hat build of OpenJDK 8 (1.8.0.282) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568) (CVE-2021-2161)\n\n* OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) (CVE-2021-2163)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1445", url: "https://access.redhat.com/errata/RHSA-2021:1445", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=core.service.openjdk&version=1.8.0.292", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=core.service.openjdk&version=1.8.0.292", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", url: "https://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/openjdk/8/html/troubleshooting_openjdk_8_for_windows/index", url: "https://access.redhat.com/documentation/en-us/openjdk/8/html/troubleshooting_openjdk_8_for_windows/index", }, { category: "external", summary: "https://openjdk.java.net/groups/vulnerability/advisories/2021-04-20", url: "https://openjdk.java.net/groups/vulnerability/advisories/2021-04-20", }, { category: "external", summary: "1951217", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", }, { category: "external", summary: "1951231", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1445.json", }, ], title: "Red Hat Security Advisory: OpenJDK 8u292 Windows Builds release and security update", tracking: { current_release_date: "2024-11-22T16:34:37+00:00", generator: { date: "2024-11-22T16:34:37+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1445", initial_release_date: "2021-04-28T12:34:14+00:00", revision_history: [ { date: "2021-04-28T12:34:14+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-28T12:34:14+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:34:37+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Build of OpenJDK", product: { name: "Red Hat Build of OpenJDK", product_id: "Red Hat Build of OpenJDK", product_identification_helper: { cpe: "cpe:/a:redhat:openjdk:1.8::windows", }, }, }, ], category: "product_family", name: "OpenJDK", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", cwe: { id: "CWE-78", name: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", }, discovery_date: "2021-03-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951231", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat Build of OpenJDK", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "RHBZ#1951231", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-2161", url: "https://www.cve.org/CVERecord?id=CVE-2021-2161", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", }, ], release_date: "2021-04-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-28T12:34:14+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", product_ids: [ "Red Hat Build of OpenJDK", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1445", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "Red Hat Build of OpenJDK", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568)", }, { cve: "CVE-2021-2163", cwe: { id: "CWE-327", name: "Use of a Broken or Risky Cryptographic Algorithm", }, discovery_date: "2021-03-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951217", }, ], notes: [ { category: "description", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "Vulnerability description", }, { category: "summary", text: "OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat Build of OpenJDK", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "RHBZ#1951217", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-2163", url: "https://www.cve.org/CVERecord?id=CVE-2021-2163", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-2163", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2163", }, ], release_date: "2021-04-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-28T12:34:14+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", product_ids: [ "Red Hat Build of OpenJDK", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1445", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "Red Hat Build of OpenJDK", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)", }, ], }
gsd-2021-2161
Vulnerability from gsd
{ GSD: { alias: "CVE-2021-2161", description: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", id: "GSD-2021-2161", references: [ "https://www.suse.com/security/cve/CVE-2021-2161.html", "https://access.redhat.com/errata/RHSA-2021:1447", "https://access.redhat.com/errata/RHSA-2021:1445", "https://advisories.mageia.org/CVE-2021-2161.html", "https://security.archlinux.org/CVE-2021-2161", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-2161", ], details: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", id: "GSD-2021-2161", modified: "2023-12-13T01:23:14.995384Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2021-2161", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Java SE JDK and JRE", version: { version_data: [ { version_affected: "=", version_value: "Java SE:7u291", }, { version_affected: "=", version_value: "Java SE:8u281", }, { version_affected: "=", version_value: "Java SE:11.0.10", }, { version_affected: "=", version_value: "Java SE:16", }, { version_affected: "=", version_value: "Java SE Embedded:8u281", }, { version_affected: "=", version_value: "Oracle GraalVM Enterprise Edition:19.3.5", }, { version_affected: "=", version_value: "Oracle GraalVM Enterprise Edition:20.3.1.2", }, { version_affected: "=", version_value: "Oracle GraalVM Enterprise Edition:21.0.0.2", }, ], }, }, ], }, vendor_name: "Oracle Corporation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", }, ], }, impact: { cvss: { baseScore: "5.9", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data.", }, ], }, ], }, references: { reference_data: [ { name: "https://www.oracle.com/security-alerts/cpuapr2021.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuapr2021.html", }, { name: "[debian-lts-announce] 20210423 [SECURITY] [DLA 2634-1] openjdk-8 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html", }, { name: "DSA-4899", refsource: "DEBIAN", url: "https://www.debian.org/security/2021/dsa-4899", }, { name: "FEDORA-2021-6eb9bbbf0c", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/", }, { name: "FEDORA-2021-65aa196c14", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/", }, { name: "FEDORA-2021-25b47f16af", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/", }, { name: "FEDORA-2021-8b80ef64f1", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/", }, { name: "FEDORA-2021-f71b592e07", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/", }, { name: "FEDORA-2021-b88e86b753", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/", }, { name: "https://security.netapp.com/advisory/ntap-20210513-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20210513-0001/", }, { name: "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures", refsource: "MISC", url: "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", }, { name: "GLSA-202209-05", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202209-05", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:oracle:jdk:11.0.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:jdk:16.0.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:jdk:1.8.0:update281:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:jdk:1.7.0:update291:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:jre:1.8.0:update281:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "11.0.10", versionStartIncluding: "11", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "13.0.6", versionStartIncluding: "13", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "15.0.2", versionStartIncluding: "15", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:openjdk:16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.10.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2021-2161", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], }, ], }, references: { reference_data: [ { name: "https://www.oracle.com/security-alerts/cpuapr2021.html", refsource: "MISC", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.oracle.com/security-alerts/cpuapr2021.html", }, { name: "[debian-lts-announce] 20210423 [SECURITY] [DLA 2634-1] openjdk-8 security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html", }, { name: "DSA-4899", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4899", }, { name: "FEDORA-2021-6eb9bbbf0c", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/", }, { name: "FEDORA-2021-65aa196c14", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/", }, { name: "FEDORA-2021-25b47f16af", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/", }, { name: "FEDORA-2021-8b80ef64f1", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/", }, { name: "FEDORA-2021-f71b592e07", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/", }, { name: "FEDORA-2021-b88e86b753", refsource: "FEDORA", tags: [ "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/", }, { name: "https://security.netapp.com/advisory/ntap-20210513-0001/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20210513-0001/", }, { name: "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures", refsource: "MISC", tags: [ "Third Party Advisory", ], url: "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", }, { name: "GLSA-202209-05", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202209-05", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 3.6, }, }, lastModifiedDate: "2022-09-23T14:07Z", publishedDate: "2021-04-22T22:15Z", }, }, }
suse-su-2021:1554-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-11-openjdk", title: "Title of the patch", }, { category: "description", text: "This update for java-11-openjdk fixes the following issues:\n\n- Update to upstream tag jdk-11.0.11+9 (April 2021 CPU)\n * CVE-2021-2163: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055)\n * CVE-2021-2161: Fixed incorrect handling of partially quoted arguments in ProcessBuilder (bsc#1185056)\n- moved mozilla-nss dependency to java-11-openjdk-headless package, this is necessary to be able to do crypto \n with just java-11-openjdk-headless installed (bsc#1184606).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-1554,SUSE-SLE-Module-Basesystem-15-SP2-2021-1554,SUSE-SLE-Module-Basesystem-15-SP3-2021-1554,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1554,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1554,SUSE-SLE-Product-HPC-15-2021-1554,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1554,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1554,SUSE-SLE-Product-SLES-15-2021-1554,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1554,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1554,SUSE-SLE-Product-SLES_SAP-15-2021-1554,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1554,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1554,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1554,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1554,SUSE-Storage-6-2021-1554", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1554-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:1554-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20211554-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:1554-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-May/008756.html", }, { category: "self", summary: "SUSE Bug 1184606", url: "https://bugzilla.suse.com/1184606", }, { category: "self", summary: "SUSE Bug 1185055", url: "https://bugzilla.suse.com/1185055", }, { category: "self", summary: "SUSE Bug 1185056", url: "https://bugzilla.suse.com/1185056", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2163 page", url: "https://www.suse.com/security/cve/CVE-2021-2163/", }, ], title: "Security update for java-11-openjdk", tracking: { current_release_date: "2021-05-11T07:44:39Z", generator: { date: "2021-05-11T07:44:39Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:1554-1", initial_release_date: "2021-05-11T07:44:39Z", revision_history: [ { date: "2021-05-11T07:44:39Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.11.0-3.56.1.aarch64", product: { name: "java-11-openjdk-11.0.11.0-3.56.1.aarch64", product_id: "java-11-openjdk-11.0.11.0-3.56.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.aarch64", product: { name: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.aarch64", product_id: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", product: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", product_id: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", product: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", product_id: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", product: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", product_id: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.11.0-3.56.1.aarch64", product: { name: "java-11-openjdk-jmods-11.0.11.0-3.56.1.aarch64", product_id: "java-11-openjdk-jmods-11.0.11.0-3.56.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.11.0-3.56.1.aarch64", product: { name: "java-11-openjdk-src-11.0.11.0-3.56.1.aarch64", product_id: "java-11-openjdk-src-11.0.11.0-3.56.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.11.0-3.56.1.i586", product: { name: "java-11-openjdk-11.0.11.0-3.56.1.i586", product_id: "java-11-openjdk-11.0.11.0-3.56.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.i586", product: { name: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.i586", product_id: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.11.0-3.56.1.i586", product: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.i586", product_id: "java-11-openjdk-demo-11.0.11.0-3.56.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.11.0-3.56.1.i586", product: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.i586", product_id: "java-11-openjdk-devel-11.0.11.0-3.56.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.11.0-3.56.1.i586", product: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.i586", product_id: "java-11-openjdk-headless-11.0.11.0-3.56.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.11.0-3.56.1.i586", product: { name: "java-11-openjdk-jmods-11.0.11.0-3.56.1.i586", product_id: "java-11-openjdk-jmods-11.0.11.0-3.56.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.11.0-3.56.1.i586", product: { name: "java-11-openjdk-src-11.0.11.0-3.56.1.i586", product_id: "java-11-openjdk-src-11.0.11.0-3.56.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", product: { name: "java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", product_id: "java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le", product: { name: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le", product_id: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.ppc64le", product: { name: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.ppc64le", product_id: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", product: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", product_id: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", product: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", product_id: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", product: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", product_id: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.11.0-3.56.1.ppc64le", product: { name: "java-11-openjdk-jmods-11.0.11.0-3.56.1.ppc64le", product_id: "java-11-openjdk-jmods-11.0.11.0-3.56.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.11.0-3.56.1.ppc64le", product: { name: "java-11-openjdk-src-11.0.11.0-3.56.1.ppc64le", product_id: "java-11-openjdk-src-11.0.11.0-3.56.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.11.0-3.56.1.s390x", product: { name: "java-11-openjdk-11.0.11.0-3.56.1.s390x", product_id: "java-11-openjdk-11.0.11.0-3.56.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.s390x", product: { name: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.s390x", product_id: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", product: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", product_id: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", product: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", product_id: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", product: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", product_id: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.11.0-3.56.1.s390x", product: { name: "java-11-openjdk-jmods-11.0.11.0-3.56.1.s390x", product_id: "java-11-openjdk-jmods-11.0.11.0-3.56.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.11.0-3.56.1.s390x", product: { name: "java-11-openjdk-src-11.0.11.0-3.56.1.s390x", product_id: "java-11-openjdk-src-11.0.11.0-3.56.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", product: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", product_id: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.x86_64", product: { name: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.x86_64", product_id: "java-11-openjdk-accessibility-11.0.11.0-3.56.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", product: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", product_id: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", product: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", product_id: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", product: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", product_id: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.11.0-3.56.1.x86_64", product: { name: "java-11-openjdk-jmods-11.0.11.0-3.56.1.x86_64", product_id: "java-11-openjdk-jmods-11.0.11.0-3.56.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.11.0-3.56.1.x86_64", product: { name: "java-11-openjdk-src-11.0.11.0-3.56.1.x86_64", product_id: "java-11-openjdk-src-11.0.11.0-3.56.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15 SP2", product: { name: "SUSE Linux Enterprise Module for Package Hub 15 SP2", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15 SP3", product: { name: "SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.0", product: { name: "SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.0", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.0", product: { name: "SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.0", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.0", product: { name: "SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.0", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP2", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", }, product_reference: "java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", }, product_reference: "java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.56.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-05-11T07:44:39Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2163", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2163", url: "https://www.suse.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "SUSE Bug 1185055 for CVE-2021-2163", url: "https://bugzilla.suse.com/1185055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.11.0-3.56.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Proxy 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Retail Branch Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-demo-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-devel-11.0.11.0-3.56.1.x86_64", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.ppc64le", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.s390x", "SUSE Manager Server 4.0:java-11-openjdk-headless-11.0.11.0-3.56.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-05-11T07:44:39Z", details: "moderate", }, ], title: "CVE-2021-2163", }, ], }
suse-su-2021:1314-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-11-openjdk", title: "Title of the patch", }, { category: "description", text: "This update for java-11-openjdk fixes the following issues:\n\n- Update to upstream tag jdk-11.0.11+9 (April 2021 CPU)\n * CVE-2021-2163: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055)\n * CVE-2021-2161: Fixed incorrect handling of partially quoted arguments in ProcessBuilder (bsc#1185056)\n- moved mozilla-nss dependency to java-11-openjdk-headless package, this is necessary to be able to do crypto \n with just java-11-openjdk-headless installed (bsc#1184606).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-1314,SUSE-SLE-SERVER-12-SP5-2021-1314", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1314-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:1314-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20211314-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:1314-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008676.html", }, { category: "self", summary: "SUSE Bug 1184606", url: "https://bugzilla.suse.com/1184606", }, { category: "self", summary: "SUSE Bug 1185055", url: "https://bugzilla.suse.com/1185055", }, { category: "self", summary: "SUSE Bug 1185056", url: "https://bugzilla.suse.com/1185056", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2163 page", url: "https://www.suse.com/security/cve/CVE-2021-2163/", }, ], title: "Security update for java-11-openjdk", tracking: { current_release_date: "2021-04-26T07:12:35Z", generator: { date: "2021-04-26T07:12:35Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:1314-1", initial_release_date: "2021-04-26T07:12:35Z", revision_history: [ { date: "2021-04-26T07:12:35Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.11.0-3.21.1.aarch64", product: { name: "java-11-openjdk-11.0.11.0-3.21.1.aarch64", product_id: "java-11-openjdk-11.0.11.0-3.21.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.aarch64", product: { name: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.aarch64", product_id: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", product: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", product_id: "java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", product: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", product_id: "java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", product: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", product_id: "java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.11.0-3.21.1.aarch64", product: { name: "java-11-openjdk-jmods-11.0.11.0-3.21.1.aarch64", product_id: "java-11-openjdk-jmods-11.0.11.0-3.21.1.aarch64", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.11.0-3.21.1.aarch64", product: { name: "java-11-openjdk-src-11.0.11.0-3.21.1.aarch64", product_id: "java-11-openjdk-src-11.0.11.0-3.21.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.11.0-3.21.1.i586", product: { name: "java-11-openjdk-11.0.11.0-3.21.1.i586", product_id: "java-11-openjdk-11.0.11.0-3.21.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.i586", product: { name: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.i586", product_id: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.11.0-3.21.1.i586", product: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.i586", product_id: "java-11-openjdk-demo-11.0.11.0-3.21.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.11.0-3.21.1.i586", product: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.i586", product_id: "java-11-openjdk-devel-11.0.11.0-3.21.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.11.0-3.21.1.i586", product: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.i586", product_id: "java-11-openjdk-headless-11.0.11.0-3.21.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.11.0-3.21.1.i586", product: { name: "java-11-openjdk-jmods-11.0.11.0-3.21.1.i586", product_id: "java-11-openjdk-jmods-11.0.11.0-3.21.1.i586", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.11.0-3.21.1.i586", product: { name: "java-11-openjdk-src-11.0.11.0-3.21.1.i586", product_id: "java-11-openjdk-src-11.0.11.0-3.21.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "java-11-openjdk-javadoc-11.0.11.0-3.21.1.noarch", product: { name: "java-11-openjdk-javadoc-11.0.11.0-3.21.1.noarch", product_id: "java-11-openjdk-javadoc-11.0.11.0-3.21.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.11.0-3.21.1.ppc64le", product: { name: "java-11-openjdk-11.0.11.0-3.21.1.ppc64le", product_id: "java-11-openjdk-11.0.11.0-3.21.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.ppc64le", product: { name: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.ppc64le", product_id: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", product: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", product_id: "java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", product: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", product_id: "java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", product: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", product_id: "java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.11.0-3.21.1.ppc64le", product: { name: "java-11-openjdk-jmods-11.0.11.0-3.21.1.ppc64le", product_id: "java-11-openjdk-jmods-11.0.11.0-3.21.1.ppc64le", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.11.0-3.21.1.ppc64le", product: { name: "java-11-openjdk-src-11.0.11.0-3.21.1.ppc64le", product_id: "java-11-openjdk-src-11.0.11.0-3.21.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.11.0-3.21.1.s390x", product: { name: "java-11-openjdk-11.0.11.0-3.21.1.s390x", product_id: "java-11-openjdk-11.0.11.0-3.21.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.s390x", product: { name: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.s390x", product_id: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", product: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", product_id: "java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", product: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", product_id: "java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", product: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", product_id: "java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.11.0-3.21.1.s390x", product: { name: "java-11-openjdk-jmods-11.0.11.0-3.21.1.s390x", product_id: "java-11-openjdk-jmods-11.0.11.0-3.21.1.s390x", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.11.0-3.21.1.s390x", product: { name: "java-11-openjdk-src-11.0.11.0-3.21.1.s390x", product_id: "java-11-openjdk-src-11.0.11.0-3.21.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-11-openjdk-11.0.11.0-3.21.1.x86_64", product: { name: "java-11-openjdk-11.0.11.0-3.21.1.x86_64", product_id: "java-11-openjdk-11.0.11.0-3.21.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.x86_64", product: { name: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.x86_64", product_id: "java-11-openjdk-accessibility-11.0.11.0-3.21.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", product: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", product_id: "java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", product: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", product_id: "java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", product: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", product_id: "java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-jmods-11.0.11.0-3.21.1.x86_64", product: { name: "java-11-openjdk-jmods-11.0.11.0-3.21.1.x86_64", product_id: "java-11-openjdk-jmods-11.0.11.0-3.21.1.x86_64", }, }, { category: "product_version", name: "java-11-openjdk-src-11.0.11.0-3.21.1.x86_64", product: { name: "java-11-openjdk-src-11.0.11.0-3.21.1.x86_64", product_id: "java-11-openjdk-src-11.0.11.0-3.21.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.21.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", }, product_reference: "java-11-openjdk-11.0.11.0-3.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", }, product_reference: "java-11-openjdk-11.0.11.0-3.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.21.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", }, product_reference: "java-11-openjdk-11.0.11.0-3.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.21.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", }, product_reference: "java-11-openjdk-11.0.11.0-3.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", }, product_reference: "java-11-openjdk-11.0.11.0-3.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", }, product_reference: "java-11-openjdk-11.0.11.0-3.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-11.0.11.0-3.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", }, product_reference: "java-11-openjdk-11.0.11.0-3.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", }, product_reference: "java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", }, product_reference: "java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", }, product_reference: "java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-26T07:12:35Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2163", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2163", url: "https://www.suse.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "SUSE Bug 1185055 for CVE-2021-2163", url: "https://bugzilla.suse.com/1185055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.11.0-3.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.11.0-3.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-26T07:12:35Z", details: "moderate", }, ], title: "CVE-2021-2163", }, ], }
suse-su-2021:3007-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-1_7_0-openjdk", title: "Title of the patch", }, { category: "description", text: "This update for java-1_7_0-openjdk fixes the following issues:\n\n- Update to 2.6.27 - OpenJDK 7u311 (July 2021 CPU)\n\nSecurity fixes:\n\n- CVE-2021-2341: Improve file transfers (bsc#1188564)\n- CVE-2021-2369: Better jar file validation (bsc#1188565)\n- CVE-2021-2432: Provide better LDAP provider support (bsc#1188568)\n- CVE-2021-2163: Enhance opening JARs (bsc#1185055)\n- CVE-2021-2161: Less ambiguous processing (bsc#1185056)\n- CVE-2018-3639: Fix revision to prefer\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-3007,SUSE-SLE-SERVER-12-SP5-2021-3007", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3007-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:3007-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20213007-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:3007-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html", }, { category: "self", summary: "SUSE Bug 1185055", url: "https://bugzilla.suse.com/1185055", }, { category: "self", summary: "SUSE Bug 1185056", url: "https://bugzilla.suse.com/1185056", }, { category: "self", summary: "SUSE Bug 1188564", url: "https://bugzilla.suse.com/1188564", }, { category: "self", summary: "SUSE Bug 1188565", url: "https://bugzilla.suse.com/1188565", }, { category: "self", summary: "SUSE Bug 1188568", url: "https://bugzilla.suse.com/1188568", }, { category: "self", summary: "SUSE CVE CVE-2018-3639 page", url: "https://www.suse.com/security/cve/CVE-2018-3639/", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2163 page", url: "https://www.suse.com/security/cve/CVE-2021-2163/", }, { category: "self", summary: "SUSE CVE CVE-2021-2341 page", url: "https://www.suse.com/security/cve/CVE-2021-2341/", }, { category: "self", summary: "SUSE CVE CVE-2021-2369 page", url: "https://www.suse.com/security/cve/CVE-2021-2369/", }, { category: "self", summary: "SUSE CVE CVE-2021-2432 page", url: "https://www.suse.com/security/cve/CVE-2021-2432/", }, ], title: "Security update for java-1_7_0-openjdk", tracking: { current_release_date: "2021-09-09T13:22:06Z", generator: { date: "2021-09-09T13:22:06Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:3007-1", initial_release_date: "2021-09-09T13:22:06Z", revision_history: [ { date: "2021-09-09T13:22:06Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", product: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", product_id: "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.aarch64", product: { name: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.aarch64", product_id: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.aarch64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.aarch64", product: { name: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.aarch64", product_id: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.aarch64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.aarch64", product: { name: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.aarch64", product_id: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.aarch64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.aarch64", product: { name: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.aarch64", product_id: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.aarch64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", product: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", product_id: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", product: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", product_id: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", product: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", product_id: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.aarch64", product: { name: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.aarch64", product_id: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.i586", product: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.i586", product_id: "java-1_7_0-openjdk-1.7.0.311-43.50.2.i586", }, }, { category: "product_version", name: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.i586", product: { name: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.i586", product_id: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.i586", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.i586", product: { name: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.i586", product_id: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.i586", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.i586", product: { name: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.i586", product_id: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.i586", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.i586", product: { name: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.i586", product_id: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.i586", }, }, { category: "product_version", name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.i586", product: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.i586", product_id: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.i586", }, }, { category: "product_version", name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.i586", product: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.i586", product_id: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.i586", }, }, { category: "product_version", name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.i586", product: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.i586", product_id: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.i586", }, }, { category: "product_version", name: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.i586", product: { name: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.i586", product_id: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "java-1_7_0-openjdk-javadoc-1.7.0.311-43.50.2.noarch", product: { name: "java-1_7_0-openjdk-javadoc-1.7.0.311-43.50.2.noarch", product_id: "java-1_7_0-openjdk-javadoc-1.7.0.311-43.50.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", product: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", product_id: "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", }, }, { category: "product_version", name: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.ppc64le", product: { name: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.ppc64le", product_id: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.ppc64le", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.ppc64le", product: { name: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.ppc64le", product_id: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.ppc64le", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.ppc64le", product: { name: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.ppc64le", product_id: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.ppc64le", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.ppc64le", product: { name: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.ppc64le", product_id: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.ppc64le", }, }, { category: "product_version", name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", product: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", product_id: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", }, }, { category: "product_version", name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", product: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", product_id: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", }, }, { category: "product_version", name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", product: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", product_id: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", }, }, { category: "product_version", name: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.ppc64le", product: { name: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.ppc64le", product_id: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390", product: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390", product_id: "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390", }, }, { category: "product_version", name: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.s390", product: { name: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.s390", product_id: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.s390", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.s390", product: { name: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.s390", product_id: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.s390", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.s390", product: { name: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.s390", product_id: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.s390", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.s390", product: { name: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.s390", product_id: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.s390", }, }, { category: "product_version", name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390", product: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390", product_id: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390", }, }, { category: "product_version", name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390", product: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390", product_id: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390", }, }, { category: "product_version", name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390", product: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390", product_id: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390", }, }, { category: "product_version", name: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.s390", product: { name: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.s390", product_id: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", product: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", product_id: "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", }, }, { category: "product_version", name: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.s390x", product: { name: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.s390x", product_id: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.s390x", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.s390x", product: { name: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.s390x", product_id: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.s390x", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.s390x", product: { name: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.s390x", product_id: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.s390x", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.s390x", product: { name: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.s390x", product_id: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.s390x", }, }, { category: "product_version", name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", product: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", product_id: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", }, }, { category: "product_version", name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", product: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", product_id: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", }, }, { category: "product_version", name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", product: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", product_id: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", }, }, { category: "product_version", name: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.s390x", product: { name: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.s390x", product_id: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", product: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", product_id: "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.x86_64", product: { name: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.x86_64", product_id: "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.x86_64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.x86_64", product: { name: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.x86_64", product_id: "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.x86_64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.x86_64", product: { name: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.x86_64", product_id: "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.x86_64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.x86_64", product: { name: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.x86_64", product_id: "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.x86_64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", product: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", product_id: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", product: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", product_id: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", product: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", product_id: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", }, }, { category: "product_version", name: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.x86_64", product: { name: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.x86_64", product_id: "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", }, product_reference: "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", }, product_reference: "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", }, product_reference: "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", }, product_reference: "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", }, product_reference: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", }, product_reference: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", }, product_reference: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", }, product_reference: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", }, product_reference: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", }, product_reference: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", }, product_reference: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", }, product_reference: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", }, product_reference: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", }, product_reference: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", }, product_reference: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", }, product_reference: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", }, product_reference: "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", }, product_reference: "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", }, product_reference: "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", }, product_reference: "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", }, product_reference: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", }, product_reference: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", }, product_reference: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", }, product_reference: "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", }, product_reference: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", }, product_reference: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", }, product_reference: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", }, product_reference: "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", }, product_reference: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", }, product_reference: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", }, product_reference: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", }, product_reference: "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2018-3639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3639", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3639", url: "https://www.suse.com/security/cve/CVE-2018-3639", }, { category: "external", summary: "SUSE Bug 1074701 for CVE-2018-3639", url: "https://bugzilla.suse.com/1074701", }, { category: "external", summary: "SUSE Bug 1085235 for CVE-2018-3639", url: "https://bugzilla.suse.com/1085235", }, { category: "external", summary: "SUSE Bug 1085308 for CVE-2018-3639", url: "https://bugzilla.suse.com/1085308", }, { category: "external", summary: "SUSE Bug 1087078 for CVE-2018-3639", url: "https://bugzilla.suse.com/1087078", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-3639", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092631 for CVE-2018-3639", url: "https://bugzilla.suse.com/1092631", }, { category: "external", summary: "SUSE Bug 1092885 for CVE-2018-3639", url: "https://bugzilla.suse.com/1092885", }, { category: "external", summary: "SUSE Bug 1094912 for CVE-2018-3639", url: "https://bugzilla.suse.com/1094912", }, { category: "external", summary: "SUSE Bug 1098813 for CVE-2018-3639", url: "https://bugzilla.suse.com/1098813", }, { category: "external", summary: "SUSE Bug 1100394 for CVE-2018-3639", url: "https://bugzilla.suse.com/1100394", }, { category: "external", summary: "SUSE Bug 1102640 for CVE-2018-3639", url: "https://bugzilla.suse.com/1102640", }, { category: "external", summary: "SUSE Bug 1105412 for CVE-2018-3639", url: "https://bugzilla.suse.com/1105412", }, { category: "external", summary: "SUSE Bug 1111963 for CVE-2018-3639", url: "https://bugzilla.suse.com/1111963", }, { category: "external", summary: "SUSE Bug 1172781 for CVE-2018-3639", url: "https://bugzilla.suse.com/1172781", }, { category: "external", summary: "SUSE Bug 1172782 for CVE-2018-3639", url: "https://bugzilla.suse.com/1172782", }, { category: "external", summary: "SUSE Bug 1172783 for CVE-2018-3639", url: "https://bugzilla.suse.com/1172783", }, { category: "external", summary: "SUSE Bug 1173489 for CVE-2018-3639", url: "https://bugzilla.suse.com/1173489", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2018-3639", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-3639", url: "https://bugzilla.suse.com/1201877", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2018-3639", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-09-09T13:22:06Z", details: "moderate", }, ], title: "CVE-2018-3639", }, { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-09-09T13:22:06Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2163", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2163", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2163", url: "https://www.suse.com/security/cve/CVE-2021-2163", }, { category: "external", summary: "SUSE Bug 1185055 for CVE-2021-2163", url: "https://bugzilla.suse.com/1185055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-09-09T13:22:06Z", details: "moderate", }, ], title: "CVE-2021-2163", }, { cve: "CVE-2021-2341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2341", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2341", url: "https://www.suse.com/security/cve/CVE-2021-2341", }, { category: "external", summary: "SUSE Bug 1188564 for CVE-2021-2341", url: "https://bugzilla.suse.com/1188564", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-09-09T13:22:06Z", details: "low", }, ], title: "CVE-2021-2341", }, { cve: "CVE-2021-2369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2369", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2369", url: "https://www.suse.com/security/cve/CVE-2021-2369", }, { category: "external", summary: "SUSE Bug 1188565 for CVE-2021-2369", url: "https://bugzilla.suse.com/1188565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-09-09T13:22:06Z", details: "moderate", }, ], title: "CVE-2021-2369", }, { cve: "CVE-2021-2432", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2432", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE product of Oracle Java SE (component: JNDI). The supported version that is affected is Java SE: 7u301. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2432", url: "https://www.suse.com/security/cve/CVE-2021-2432", }, { category: "external", summary: "SUSE Bug 1188568 for CVE-2021-2432", url: "https://bugzilla.suse.com/1188568", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-09-09T13:22:06Z", details: "low", }, ], title: "CVE-2021-2432", }, ], }
suse-su-2021:2797-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-1_8_0-openjdk", title: "Title of the patch", }, { category: "description", text: "This update for java-1_8_0-openjdk fixes the following issues:\n\n- Update to version jdk8u302 (icedtea 3.20.0)\n- CVE-2021-2341: Improve file transfers. (bsc#1188564)\n- CVE-2021-2369: Better jar file validation. (bsc#1188565)\n- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)\n- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)\n", title: "Description of the patch", }, { category: "details", text: "HPE-Helion-OpenStack-8-2021-2797,SUSE-2021-2797,SUSE-OpenStack-Cloud-8-2021-2797,SUSE-OpenStack-Cloud-9-2021-2797,SUSE-OpenStack-Cloud-Crowbar-8-2021-2797,SUSE-OpenStack-Cloud-Crowbar-9-2021-2797,SUSE-SLE-SAP-12-SP3-2021-2797,SUSE-SLE-SAP-12-SP4-2021-2797,SUSE-SLE-SERVER-12-SP2-BCL-2021-2797,SUSE-SLE-SERVER-12-SP3-2021-2797,SUSE-SLE-SERVER-12-SP3-BCL-2021-2797,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2797,SUSE-SLE-SERVER-12-SP5-2021-2797", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2797-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:2797-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20212797-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:2797-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html", }, { category: "self", summary: "SUSE Bug 1185056", url: "https://bugzilla.suse.com/1185056", }, { category: "self", summary: "SUSE Bug 1188564", url: "https://bugzilla.suse.com/1188564", }, { category: "self", summary: "SUSE Bug 1188565", url: "https://bugzilla.suse.com/1188565", }, { category: "self", summary: "SUSE Bug 1188566", url: "https://bugzilla.suse.com/1188566", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2341 page", url: "https://www.suse.com/security/cve/CVE-2021-2341/", }, { category: "self", summary: "SUSE CVE CVE-2021-2369 page", url: "https://www.suse.com/security/cve/CVE-2021-2369/", }, { category: "self", summary: "SUSE CVE CVE-2021-2388 page", url: "https://www.suse.com/security/cve/CVE-2021-2388/", }, ], title: "Security update for java-1_8_0-openjdk", tracking: { current_release_date: "2021-08-20T08:34:37Z", generator: { date: "2021-08-20T08:34:37Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:2797-1", initial_release_date: "2021-08-20T08:34:37Z", revision_history: [ { date: "2021-08-20T08:34:37Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", product: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", product_id: "java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.aarch64", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.aarch64", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.aarch64", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.aarch64", product_id: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.i586", product: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.i586", product_id: "java-1_8_0-openjdk-1.8.0.302-27.63.2.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.i586", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.i586", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.i586", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.i586", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.i586", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.i586", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.i586", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.i586", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.i586", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.i586", product_id: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-javadoc-1.8.0.302-27.63.2.noarch", product: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-27.63.2.noarch", product_id: "java-1_8_0-openjdk-javadoc-1.8.0.302-27.63.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", product: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", product_id: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.ppc64le", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.ppc64le", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.ppc64le", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.ppc64le", product_id: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390", product: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390", product_id: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.s390", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.s390", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.s390", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.s390", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.s390", product_id: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", product: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", product_id: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.s390x", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.s390x", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.s390x", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.s390x", product_id: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", product: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", product_id: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.x86_64", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.x86_64", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-27.63.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.x86_64", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.x86_64", product_id: "java-1_8_0-openjdk-src-1.8.0.302-27.63.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "HPE Helion OpenStack 8", product: { name: "HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8", product_identification_helper: { cpe: "cpe:/o:suse:hpe-helion-openstack:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 8", product: { name: "SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 8", product: { name: "SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-20T08:34:37Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2341", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2341", url: "https://www.suse.com/security/cve/CVE-2021-2341", }, { category: "external", summary: "SUSE Bug 1188564 for CVE-2021-2341", url: "https://bugzilla.suse.com/1188564", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-20T08:34:37Z", details: "low", }, ], title: "CVE-2021-2341", }, { cve: "CVE-2021-2369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2369", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2369", url: "https://www.suse.com/security/cve/CVE-2021-2369", }, { category: "external", summary: "SUSE Bug 1188565 for CVE-2021-2369", url: "https://bugzilla.suse.com/1188565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-20T08:34:37Z", details: "moderate", }, ], title: "CVE-2021-2369", }, { cve: "CVE-2021-2388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2388", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2388", url: "https://www.suse.com/security/cve/CVE-2021-2388", }, { category: "external", summary: "SUSE Bug 1188566 for CVE-2021-2388", url: "https://bugzilla.suse.com/1188566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.302-27.63.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.302-27.63.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-20T08:34:37Z", details: "important", }, ], title: "CVE-2021-2388", }, ], }
suse-su-2021:2798-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for java-1_8_0-openjdk", title: "Title of the patch", }, { category: "description", text: "This update for java-1_8_0-openjdk fixes the following issues:\n\n- Update to version jdk8u302 (icedtea 3.20.0)\n- CVE-2021-2341: Improve file transfers. (bsc#1188564)\n- CVE-2021-2369: Better jar file validation. (bsc#1188565)\n- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)\n- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-2798,SUSE-SLE-Module-Legacy-15-SP2-2021-2798,SUSE-SLE-Module-Legacy-15-SP3-2021-2798,SUSE-SLE-Product-SLES-15-2021-2798,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2798,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2798,SUSE-SLE-Product-SLES_SAP-15-2021-2798,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2798,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2798,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2798,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2798,SUSE-Storage-6-2021-2798", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2798-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:2798-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20212798-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:2798-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html", }, { category: "self", summary: "SUSE Bug 1185056", url: "https://bugzilla.suse.com/1185056", }, { category: "self", summary: "SUSE Bug 1188564", url: "https://bugzilla.suse.com/1188564", }, { category: "self", summary: "SUSE Bug 1188565", url: "https://bugzilla.suse.com/1188565", }, { category: "self", summary: "SUSE Bug 1188566", url: "https://bugzilla.suse.com/1188566", }, { category: "self", summary: "SUSE CVE CVE-2021-2161 page", url: "https://www.suse.com/security/cve/CVE-2021-2161/", }, { category: "self", summary: "SUSE CVE CVE-2021-2341 page", url: "https://www.suse.com/security/cve/CVE-2021-2341/", }, { category: "self", summary: "SUSE CVE CVE-2021-2369 page", url: "https://www.suse.com/security/cve/CVE-2021-2369/", }, { category: "self", summary: "SUSE CVE CVE-2021-2388 page", url: "https://www.suse.com/security/cve/CVE-2021-2388/", }, ], title: "Security update for java-1_8_0-openjdk", tracking: { current_release_date: "2021-08-20T08:38:42Z", generator: { date: "2021-08-20T08:38:42Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:2798-1", initial_release_date: "2021-08-20T08:38:42Z", revision_history: [ { date: "2021-08-20T08:38:42Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", product: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", product_id: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", product_id: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.i586", product: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.i586", product_id: "java-1_8_0-openjdk-1.8.0.302-3.55.2.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.i586", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.i586", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.i586", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.i586", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.i586", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.i586", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.i586", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.i586", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.i586", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.i586", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.i586", product_id: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", product: { name: "java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", product_id: "java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", product: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", product_id: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", product_id: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", product: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", product_id: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", product_id: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", product: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", product_id: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", product: { name: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", product_id: "java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", product: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", product_id: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", product: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", product_id: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", product: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", product_id: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, }, { category: "product_version", name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", product: { name: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", product_id: "java-1_8_0-openjdk-src-1.8.0.302-3.55.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP2", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP3", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.0", product: { name: "SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.0", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.0", product: { name: "SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.0", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.0", product: { name: "SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.0", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", }, product_reference: "java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, ], }, vulnerabilities: [ { cve: "CVE-2021-2161", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2161", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2161", url: "https://www.suse.com/security/cve/CVE-2021-2161", }, { category: "external", summary: "SUSE Bug 1185056 for CVE-2021-2161", url: "https://bugzilla.suse.com/1185056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-20T08:38:42Z", details: "moderate", }, ], title: "CVE-2021-2161", }, { cve: "CVE-2021-2341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2341", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2341", url: "https://www.suse.com/security/cve/CVE-2021-2341", }, { category: "external", summary: "SUSE Bug 1188564 for CVE-2021-2341", url: "https://bugzilla.suse.com/1188564", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-20T08:38:42Z", details: "low", }, ], title: "CVE-2021-2341", }, { cve: "CVE-2021-2369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2369", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2369", url: "https://www.suse.com/security/cve/CVE-2021-2369", }, { category: "external", summary: "SUSE Bug 1188565 for CVE-2021-2369", url: "https://bugzilla.suse.com/1188565", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-20T08:38:42Z", details: "moderate", }, ], title: "CVE-2021-2369", }, { cve: "CVE-2021-2388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-2388", }, ], notes: [ { category: "general", text: "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-2388", url: "https://www.suse.com/security/cve/CVE-2021-2388", }, { category: "external", summary: "SUSE Bug 1188566 for CVE-2021-2388", url: "https://bugzilla.suse.com/1188566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Proxy 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Retail Branch Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-demo-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-devel-1.8.0.302-3.55.2.x86_64", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.ppc64le", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.s390x", "SUSE Manager Server 4.0:java-1_8_0-openjdk-headless-1.8.0.302-3.55.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-08-20T08:38:42Z", details: "important", }, ], title: "CVE-2021-2388", }, ], }
ghsa-f8w7-hh6g-979x
Vulnerability from github
Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
{ affected: [], aliases: [ "CVE-2021-2161", ], database_specific: { cwe_ids: [], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2021-04-22T22:15:00Z", severity: "MODERATE", }, details: "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", id: "GHSA-f8w7-hh6g-979x", modified: "2022-05-24T17:48:41Z", published: "2022-05-24T17:48:41Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-2161", }, { type: "WEB", url: "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures", }, { type: "WEB", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202209-05", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20210513-0001", }, { type: "WEB", url: "https://www.debian.org/security/2021/dsa-4899", }, { type: "WEB", url: "https://www.oracle.com/security-alerts/cpuapr2021.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.